• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Security Architecture

MIS 5214 - Section 001 - David Lanter

Security Architecture

MIS 5214.703 ■ Spring 2022 ■ David Lanter
  • Homepage
  • Instructor
  • Syllabus
  • Schedule
    • First Half of the Semester
      • Unit 01 – Threat Environment
      • Unit 02 – System Security Plan
      • Unit 03 – Planning and Policy
      • Unit 04 – Cryptography
      • Unit 05 – Secure Networks
      • Unit 06 – Firewalls
      • Unit 07 – Mid-Term Exam
    • Second Half of the Semester
      • Unit 08 – Access Control
      • Unit 9 Host Hardening
      • Unit 10 Application Security
      • Unit 11 Data Protection
      • Unit 12 – Incident and Disaster Response
  • Deliverables
    • Assignments
    • Case Studies
      • Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident
      • Case Study 2 – Data Breach at Equifax
    • Participation
    • Team Project
  • Harvard Coursepack

David Lanter

My question about System Security Plans to discuss with my classmates

January 12, 2022 by David Lanter 39 Comments

Filed Under: 02 - System Security Plan Tagged With:

In The News

January 12, 2022 by David Lanter 15 Comments

Contribute a link and a brief summary.

Filed Under: 02 - System Security Plan Tagged With:

Boyle and Panko: Chapter 1 “The Threat Environment”

January 3, 2022 by David Lanter 22 Comments

Post your thoughtful analysis about one key point you took from this assigned reading. (This first week you are not required to post: One question to ask your fellow classmates to facilitate discussion, nor are required to post In The News nor comment on other students’ postings.)

Filed Under: 01 - Threat Environment Tagged With:

Welcome to Security Architecture

January 3, 2022 by David Lanter

Course

In this course you will study and learn about how organizations plan, design and develop enterprise security architecture, align their IT security capabilities with its business goals and strategy, and assess IT system security architectures and capabilities.

Objectives

  1. Learn key Enterprise Security Architecture concepts
  2. Develop an understanding of contextual, conceptual, logical, physical and component levels or security architectures and how they relate to one another
  3. Learn how security architectures are planned, designed and documented
  4. Gain an overview of how security architectures are evaluated and assessed
  5. Gain experience working as part of team, developing and delivering a professional presentation

Filed Under: 01 - Introduction Tagged With:

Ross, J.W., Weill P., and Robertson D.C. (2008), “Implement the Operating Model Via Enterprise Architecture”

January 3, 2022 by David Lanter 18 Comments

Post your thoughtful analysis about one key point you took from this assigned reading.

Filed Under: 01 - Threat Environment Tagged With:

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 5
  • Page 6
  • Page 7

Primary Sidebar

Weekly Discussions

  • 01 – Introduction (2)
  • 01 – Threat Environment (3)
  • 02 – System Security Plan (6)
  • 03 – Planning and Policy (7)
  • 04 – Cryptography (6)
  • 05 – Secure Networks (7)
  • 06 – Firewalls (5)
  • 08 – Access Control (7)
  • 09 – Host Hardening (5)
  • 10 – Application Security (6)
  • 11 – Data Protection (4)
  • 12 – Incident and Disaster Response (5)
  • 13 – Review (1)
  • 13 – Team Project Presentations and Review for Final (1)
Fox School of Business

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in