• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Security Architecture

MIS 5214 - Section 001 - David Lanter

Security Architecture

MIS 5214.702 ■ Spring 2021 ■ Wade Mackey
  • Homepage
  • Instructor
  • Syllabus
  • Schedule
    • First Half of the Semester
      • Unit 01 – Threat Environment
      • Unit 02 – System Security Plan
      • Unit 03 – Planning and Policy
      • Unit 04 – Cryptography
      • Unit 05 – Secure Networks
      • Unit 06 – Firewalls
      • Unit 07 – Mid-Term Exam
    • Second Half of the Semester
      • Unit 08 – Access Control
      • Unit 9 Host Hardening
      • Unit 10 Application Security
      • Unit 11 Data Protection
      • Unit 12 – Incident and Disaster Response
  • Deliverables
    • Assignments
    • Case Studies
      • Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident
      • Case Study 2 – Cyberattack: The Maersk Global Supply-Chain Meltdown
    • Participation
    • Team Project
  • Harvard Coursepack
  • Gradebook

01 - Threat Environment

Week 2 Presentation

January 27, 2021 by Wade Mackey Leave a Comment

02_MIS5214_S21_Unit#2_SystemSecurityPlan

Filed Under: 01 - Threat Environment Tagged With:

Example In the News Item

January 20, 2021 by Wade Mackey Leave a Comment

macOS malware used run-only AppleScripts to avoid detection for five years | ZDNet

Two things stuck with me in this article.  First, that the malware had abound for five years.  Second, that the technique used is not that complicated.  Basically a fairly simple nested obfuscation.

Filed Under: 01 - Introduction, 01 - Threat Environment Tagged With:

Week 1 Presentation

January 20, 2021 by Wade Mackey Leave a Comment

01_MIS5214_001_S21_Unit#1_Introduction+ThreatEnvironment

Filed Under: 01 - Introduction, 01 - Threat Environment Tagged With:

Boyle and Panko: Chapter 1 “The Threat Environment”

December 22, 2020 by Wade Mackey 6 Comments

Post your thoughtful analysis about one key point you took from this assigned reading. (This first week you are not required to post: One question to ask your fellow classmates to facilitate discussion, nor are required to post In The News nor comment on other students’ postings.)

Filed Under: 01 - Threat Environment Tagged With:

Ross, J.W., Weill P., and Robertson D.C. (2008), “Implement the Operating Model Via Enterprise Architecture”

December 22, 2020 by Wade Mackey 6 Comments

Post your thoughtful analysis about one key point you took from this assigned reading.

Filed Under: 01 - Threat Environment Tagged With:

Primary Sidebar

Weekly Discussions

  • 01 – Introduction (3)
  • 01 – Threat Environment (5)
  • 02 – System Security Plan (5)
  • 03 – Planning and Policy (7)
  • 04 – Cryptography (6)
  • 05 – Secure Networks (7)
  • 06 – Firewalls (5)
  • 08 – Access Control (7)
  • 09 – Host Hardening (4)
  • 10 – Application Security (5)
  • 11 – Data Protection (3)
  • 12 – Incident and Disaster Response (4)
Fox School of Business

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in