• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Security Architecture

MIS 5214 - Section 001 - David Lanter

Security Architecture

MIS 5214.702 ■ Spring 2021 ■ Wade Mackey
  • Homepage
  • Instructor
  • Syllabus
  • Schedule
    • First Half of the Semester
      • Unit 01 – Threat Environment
      • Unit 02 – System Security Plan
      • Unit 03 – Planning and Policy
      • Unit 04 – Cryptography
      • Unit 05 – Secure Networks
      • Unit 06 – Firewalls
      • Unit 07 – Mid-Term Exam
    • Second Half of the Semester
      • Unit 08 – Access Control
      • Unit 9 Host Hardening
      • Unit 10 Application Security
      • Unit 11 Data Protection
      • Unit 12 – Incident and Disaster Response
  • Deliverables
    • Assignments
    • Case Studies
      • Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident
      • Case Study 2 – Cyberattack: The Maersk Global Supply-Chain Meltdown
    • Participation
    • Team Project
  • Harvard Coursepack
  • Gradebook

Boyle and Panko: Chapter 1 “The Threat Environment”

December 22, 2020 by Wade Mackey 6 Comments

Post your thoughtful analysis about one key point you took from this assigned reading. (This first week you are not required to post: One question to ask your fellow classmates to facilitate discussion, nor are required to post In The News nor comment on other students’ postings.)

Filed Under: 01 - Threat Environment Tagged With:

Reader Interactions

Comments

  1. Jonathan Mettus says

    January 24, 2021 at 10:21 am

    Being that the book was published in 2015, there are obviously aspects that are outdated. There was a section in the first chapter where the authors talked about discovering vulnerabilities. The point that was made was “software companies rarely pay vulnerability discoverers. As a consequence, a growing number of analysts sell vulnerability discoveries on one of several vulnerability black market.” The interesting thing is, to my knowledge, this has drastically changed since 2015. Bug bounty programs seem to have taken off. And the rewards keep increasing every year. To use a DarkReading.com article, “In 2018, for example, ethical hackers made $19 million through HackerOne’s vulnerability-program management platform, compared to $11.7 million the prior year.” I wonder what this has done to the black market for vulnerabilities.

    Log in to Reply
    • Michael Doherty says

      February 7, 2021 at 5:12 pm

      Jonathan,

      I agree about the 2015 point, I wonder if the authors still feel the same way about the book in 2021

      Log in to Reply
  2. Nicholas Fabrizio says

    January 24, 2021 at 12:54 pm

    A key point that I took from this chapter is the threat environment is vast and ever changing for organizations. Organizations have to deal with a wide array of different adversaries, attack vectors, and deal with the aftermath of successful compromises. The different adversaries could include current/former employees, organizational competition, nation-state, and more. These adversaries have many avenues to perform their attacks, e.g. web based, extortion, or various types of malware. Lastly, in the event a compromise is successful and violates one of the security objectives: confidentiality, integrity, and availability, it could cost the organization millions of dollars. This money may be used to notify customers of the incident, lawsuits, remediation of the vulnerability, or long term financial loss from losing customers and bad reputation.

    Log in to Reply
  3. Lakshmi Surujnauth says

    January 24, 2021 at 8:24 pm

    One key point is that employees otherwise dubbed the “trusted insider” pose arguably the most significant threat to confidentiality, integrity and availability of information systems – be it intentionally or accidentally. Employees have knowledge and access to internal systems, knowledge of the system controls and are aware of ways to avoid detection and above all, they are trusted.

    Log in to Reply
  4. Elias Harake says

    January 24, 2021 at 8:59 pm

    The key point that I found interesting from Chapter 1 was that IT security professionals believe that the threat environment will continue to change and become more sophisticated. I think this point is very concerning since just a few weeks ago United States government became a victim of a massive cyberattack. It is believed that a Trojan horse software has infiltrated many different departments and agencies within the United States’ government. These include the Department of the Treasury, Department of Homeland Security, Department of Energy, Department of Defence, and the Department of Commerce just to name a few. The Trojan was name SUNBURST by FireEye, a world-renowned cybersecurity firm. Confidential information is believed to have been exposed and shared with the Russian government, which could be considered an act of cyberwar. The effects and implications of this data breach may become evident in the coming years.

    Log in to Reply
  5. Michael Doherty says

    February 7, 2021 at 5:11 pm

    The point in chapter 1 is that the professionals believe that the environment will continue to change. Tis makes sense and should definitely be considered, There will always be someone who is looking for the next greatest thing, This can be used with technology, To be the first with the next greatest technology comes as a risk, because now someone will attempt to better you or look for ways to down
    grade.

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • 01 – Introduction (3)
  • 01 – Threat Environment (5)
  • 02 – System Security Plan (5)
  • 03 – Planning and Policy (7)
  • 04 – Cryptography (6)
  • 05 – Secure Networks (7)
  • 06 – Firewalls (5)
  • 08 – Access Control (7)
  • 09 – Host Hardening (4)
  • 10 – Application Security (5)
  • 11 – Data Protection (3)
  • 12 – Incident and Disaster Response (4)
Fox School of Business

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in