• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Security Architecture

MIS 5214 - Section 001 - David Lanter

Security Architecture

MIS 5214.703 ■ Spring 2022 ■ David Lanter
  • Homepage
  • Instructor
  • Syllabus
  • Schedule
    • First Half of the Semester
      • Unit 01 – Threat Environment
      • Unit 02 – System Security Plan
      • Unit 03 – Planning and Policy
      • Unit 04 – Cryptography
      • Unit 05 – Secure Networks
      • Unit 06 – Firewalls
      • Unit 07 – Mid-Term Exam
    • Second Half of the Semester
      • Unit 08 – Access Control
      • Unit 9 Host Hardening
      • Unit 10 Application Security
      • Unit 11 Data Protection
      • Unit 12 – Incident and Disaster Response
  • Deliverables
    • Assignments
    • Case Studies
      • Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident
      • Case Study 2 – Data Breach at Equifax
    • Participation
    • Team Project
  • Harvard Coursepack

My question to discuss with my classmates

February 23, 2022 by David Lanter 44 Comments

Filed Under: 08 - Access Control Tagged With:

Reader Interactions

Comments

  1. Yangyuan Lin says

    March 1, 2022 at 7:48 pm

    Many smartphones use single-factor authentication, such as unlocking if you know the passcode or use biometrics. But there are many evidences proved that fingerprint or facial recognition have vulnerability, but why do smartphone company still insist on AAL1?

    Log in to Reply
    • Mohammed Syed says

      March 6, 2022 at 5:09 pm

      Because AAL1 gives several assurances that the claimant controls an authenticator bound to the subscriber’s account. It requires single-factor authentication. It is a fast identity online considered an authentication transaction target at AAL1. AAL1 permitted authenticator types, like a memorized secret, lookup, OOB device, single and multiple factor OTP device. Single-factor Cryptographic software as well.

      Log in to Reply
  2. Corey Arana says

    March 4, 2022 at 8:48 pm

    How many of you use the same passwords for multiple sites?
    1-5
    6-10
    10+

    Log in to Reply
    • Oluwaseun Soyomokun says

      March 5, 2022 at 3:55 am

      I use almost same password across multiple sites but I feel the password can’t be guessed because its so lengthy. But sometimes when I feel my mind might not keep track of the password, I stay with one of the known password for easy access. Each time we click the forgot password on those sites, it makes the password database learn and store possible new and old password combination to the sites.

      Log in to Reply
      • Corey Arana says

        March 8, 2022 at 10:03 am

        Having a lengthy password is definitely a good thing to have. Consider using MFA for your more important accounts such as your online banking. If somehow your account f0r a less important website gets hacked, your password for all your accounts would be compromised.

        Log in to Reply
    • Mohammed Syed says

      March 6, 2022 at 3:46 pm

      I used different passwords for multiple sites. However, if you are using the same password in all places, Hackers will get access to your account because a single leak of that password anywhere puts your accounts at risk, and they are different ways hackers attack your account. For example, brute force attacks. I would say use different passwords for multiple websites and different accounts and change the password every 90 days.

      Log in to Reply
      • Matthew Bryan says

        March 6, 2022 at 5:14 pm

        I agree with the points you raised Mohammed. Having unique passwords for every service is important. If your account was involved in a breach your password should be considered compromised. Attackers can use the contents of a breach to launch automated attacks trying the same username and password across multiple sites. Check out https://haveibeenpwned.com/ to see if your email or phone number has been involved in a breach.

        Using a password manager with breach monitoring has helped me manage passwords across the services I use. This allows me to set unique, complex, and random passwords for each application. It also allows me to automate the changing of passwords which saves time.

        Log in to Reply
      • Corey Arana says

        March 8, 2022 at 10:05 am

        I couldn’t say it better myself, Mohammed. If your account is hacked, your passwords anywhere else are compromised. At my old job, we were required to change passwords every 30 days for our systems with PII.

        Log in to Reply
    • Alexander William Knoll says

      March 7, 2022 at 11:24 pm

      I use the same password for basically everything, which is definitely a problem. Thankfully most important applications have a level of 2FA, so I don’t feel completely exposed, but it’s still an issue. I’ve recently gained access to the use of a family membership for a password manager, so I am hoping to take advantage of that soon enough.

      Log in to Reply
      • Corey Arana says

        March 8, 2022 at 10:06 am

        I’m big on MFA, its a great tool to use to have that extra layer of security. I am unfamiliar with password manager, can you explain what that is in detail? Thanks

        Log in to Reply
        • Alexander William Knoll says

          March 8, 2022 at 11:37 pm

          A password manager is basically an application on your computer that a user can use to manage their passwords for everything. So for example it will assign a different complex password to your gmail, facebook, etc. and those passwords are then locked up behind an encrypted database that has one “master” password which can be used to access all of your apps or websites. Honestly that’s as much as I know about it until I actually take the time to set mine up, but I think that’s the gist of it.

          Log in to Reply
    • Joshua Moses says

      March 9, 2022 at 12:20 pm

      Even though I know better, I still use the same 3 passwords for most of my accounts lol I know this is not good at all, especially as an aspiring information systems security professional. I learned about this back in 2013, yet I still haven’t implemented the knowledge into my everyday life. This is something that I am definitely going to work on moving forward, because I know it puts my many accounts at risk of being compromised.

      Log in to Reply
  3. Oluwaseun Soyomokun says

    March 5, 2022 at 4:51 am

    The Access controls from the NIST SP 800 -63-3, NIST SP 800 -63A, NIST SP 800 -63B which control is much more effective and efficient?

    Log in to Reply
    • Bryan Garrahan says

      March 9, 2022 at 2:54 pm

      All three NIST documents describe United States federal government computer security policies, procedures and guidelines. However, I think it depends on the nature of your business as to which document will be the most efficient for usage.

      Log in to Reply
      • Hang Nu Song Nguyen says

        April 10, 2022 at 8:19 pm

        I agree with Bryan . It’s all depend on the nature of business and the implement will be based on budgets.

        Log in to Reply
  4. Elizabeth Gutierrez says

    March 5, 2022 at 10:03 am

    There is a consensus among security professionals that passwords are no longer safe and are expected to be phased out. With that being said, what alternative measures can be used and which one do you think is the most effective?

    Log in to Reply
    • Matthew Bryan says

      March 6, 2022 at 5:32 pm

      Passwordless options can use a combination of biometrics, hardware tokens, uniquely registered devices, or other factors that combine something the user is and something the user has.

      My work has been exploring passwordless options using a combination of Window’s Hello (this uses facial recognition) along with the Microsoft authenticator app to allow users to sign into our domain. The main barrier we’re facing is the hardware deployment as this will require most devices to be upgraded. I imagine other organizations are in the same situation which leads me to believe that passwords will be around for a while longer. I can see deploying these options to high risk users, i.e. executives, initially and then rolling this out to others as hardware is refreshed.

      In general, I think a combination of a biometric factor and a uniquely registered device will be the most effective solution to eliminate passwords.

      Log in to Reply
    • Alexander William Knoll says

      March 7, 2022 at 11:31 pm

      At my last organization I had to use a combination of my own password & a security token to access my computer. If passwords are phased out, I expect security tokens to be a standard, along with biometric scanning methods such as fingerprint thumb drives & facial recognition devices. Obviously the risk of losing a token/thumb drives is always a high possibility, so I would say the way of facial recognition would be the most effective, at least at this point in time.

      Log in to Reply
  5. Shubham Patil says

    March 5, 2022 at 6:54 pm

    What is the likely future of passwords?

    Log in to Reply
    • Mohammed Syed says

      March 6, 2022 at 5:37 pm

      According to Beyond identity” in 2020, the Verizon DBIR reported that over 80% of data breaches involved the use of lost or stolen credentials further proving that passwords are just as insecure as they were in the 1960s.” Beyond identity provides seamless and secure passwordless authentication.
      https://www.beyondidentity.com/blog/history-and-future-passwords

      Log in to Reply
    • Elizabeth Gutierrez says

      March 7, 2022 at 7:36 pm

      Hi Shubham,
      Boyle and Panko’s Chapter 5 section 3 addresses the future of passwords. They are expected to be phased out in the near future as a security measure; many organizations have already started to do so. We can expect authentication technologies to replace complex passwords. I would argue that the most promising seems to be biometric authentication.

      Log in to Reply
    • Hang Nu Song Nguyen says

      April 10, 2022 at 8:12 pm

      I think the future of password will be more complex and long. Moreover, to access an system, an user will require not only input a password but also answer security questions.

      Log in to Reply
  6. Bryan Garrahan says

    March 6, 2022 at 1:15 pm

    Do you think biometric passwords more secure then credential (i.e. 9-12 digit) passwords? What are the pros / cons of both?

    Log in to Reply
    • Yangyuan Lin says

      March 6, 2022 at 9:50 pm

      I think biometric passwords are more secure than passwords. Biometric passwords such as fingerprints and iris are unique biometrics, unlike passwords that are easily entered by attackers. More importantly, biometric passwords actually implement multi-factor authentication, because you need to be physically present to use biometric passwords.

      Log in to Reply
      • Oluwaseun Soyomokun says

        April 20, 2022 at 11:00 pm

        Lin, in my honest view, a strong lengthy password is more secure because it takes almost forever to crack if you don’t share it with anyone, but it turns out that the government can collect your biometric data without your permission by any likely means. They can’t have your password if you haven’t agreed to it, on the other hand.

        Log in to Reply
  7. Matthew Bryan says

    March 6, 2022 at 4:45 pm

    In a criminal investigation involving a phone, why is withholding a passcode protected by the 5th amendment when providing biometric authentication is not? Do you agree or disagree with this precedent?

    Log in to Reply
    • Elizabeth Gutierrez says

      March 7, 2022 at 5:39 pm

      Hi Matthew,
      Great question. In my Cyber-investigations, Digital Forensics, and The Law course, we have examined whether a password is considered a key or an idea. To answer your question, in a criminal investigation, the Fifth Amendment protects defendants from revealing their numeric passcodes because it could be considered a self-incriminating testimonial. In U.S. v. Kirschner (2010), a Michigan child exploitation material case, the court ruled that a password can not be compelled by grand jury subpoena because it is being recovered from the defendants mind. The precedent for this case was United States v. Hubbell (2000) where the court held that the compulsion of the defendant to produce certain documents was unconstitutional, since it required him to use his own thoughts to identify them. On the other hand, the government can compel a suspect to produce a biometric password because it is compulsion of the accused to exhibit his physical characteristics. I am not opposed to this precedent because it comes down to something you know vs something you have. If you think about it, biometrics in and of itself is not testimony.

      Log in to Reply
  8. Mohammed Syed says

    March 6, 2022 at 5:39 pm

    what is the implicit cleanup rule, and why is it important?

    Log in to Reply
    • Elizabeth Gutierrez says

      March 7, 2022 at 9:50 pm

      Hi Mohammed,
      From my understanding, the implicit cleanup rule is applied if none of the rules in the Policy Layer match. It is considered the “default catch-all rule” that that deals with traffic. It is important because it is set to drop all traffic that does not match any explicit or implied rules in the Layers. More specifically, when a packet arrives at the gateway, it is checked against the rules in the Top policy layer and sequentially moving down through the layer.

      Log in to Reply
  9. Miray Bolukbasi says

    March 6, 2022 at 8:06 pm

    Which access control requires the company to create a public key?

    Log in to Reply
  10. Michael Duffy says

    March 7, 2022 at 12:39 am

    What do you think is the best form of two-factor authentication and why?

    Log in to Reply
    • Hang Nu Song Nguyen says

      April 10, 2022 at 8:17 pm

      I think Google Authentication and company portal are the popular 2FA apps. Moreover, using a separate piece of hardware is another way to gain security of any online account.

      Log in to Reply
  11. Alexander William Knoll says

    March 7, 2022 at 11:35 pm

    What do you believe is currently the most effective form of biometric authentication (fingerprint, facial, iris, etc.)?

    Log in to Reply
    • Amelia Safirstein says

      March 8, 2022 at 12:07 pm

      I think this depends on your organization’s needs. If security needs are very high and money is no object, iris scans are probably the best form of biometric authentication.

      Log in to Reply
  12. Jason Burwell says

    March 8, 2022 at 10:12 am

    Why are Phishing attacks so successful?

    Log in to Reply
    • Amelia Safirstein says

      March 8, 2022 at 11:56 am

      Humans tend to be the weakest link in cyber security. We tend to trust each other and make exceptions where machines/software wouldn’t.

      Log in to Reply
  13. Ryan Trapp says

    March 8, 2022 at 11:43 am

    The chapter in Boyle and Panko mentioned that passwords are being phased out at some companies, due to them being seen as no longer safe due to growing computer power. How would you be affected if your company was to phase out the use of passwords? Would it even be possible?

    Log in to Reply
    • Amelia Safirstein says

      March 8, 2022 at 12:01 pm

      For many organizations (including the one that I work for), phasing out passwords and switching to a different method of authentication (like biometric authentication) would be extremely expensive. For organizations with higher risk tolerance, I believe the switch away from passwords will take more time.

      Log in to Reply
  14. Amelia Safirstein says

    March 8, 2022 at 11:46 am

    Password policies are in place to ensure that passwords are long enough, complex enough, and changed frequently enough to be reasonably secure. Can password policies be too strict or too intense?

    Log in to Reply
    • Joshua Moses says

      March 9, 2022 at 12:12 pm

      I believe that a password policy does have the potential to be too strict. I wouldn’t say that this is necessarily a bad thing though. It is ideal to have passwords require a capital and lowercase letter, a number, a special character and even a certain length.

      In contrast people tend to forget these long passwords, so they’d write it down on a sticky note and put it someone that can be easily accessed. This makes them even more susceptible to having their accounts compromised!

      Log in to Reply
  15. Ornella Rhyne says

    March 8, 2022 at 6:39 pm

    What places are considered sensitive areas in a company access control?

    Log in to Reply
  16. Joshua Moses says

    March 9, 2022 at 12:07 pm

    Can you provide at least one example of identity proofing?

    Log in to Reply
    • Shubham Patil says

      March 9, 2022 at 12:42 pm

      Joshua,

      Increasing the likelihood of a positive ID verification is a matter of gathering more data from the person and increasing available data sources. Fortunately, in today’s data-rich world, there are many more sources of identity information. For example, mobile data, social media information and geolocation all provide additional parameters to match against.
      Identity verification validates that the individual does indeed exist. However, there remains the question, is that person really who they say they are? This question requires private information, which only that person should know. This process of analyzing confidential information for identity proofing is known as identity authentication.

      Log in to Reply
  17. Hang Nu Song Nguyen says

    April 10, 2022 at 8:21 pm

    How to make an effective and accurately access control policies without hurting or preventing business operating?

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • 01 – Introduction (2)
  • 01 – Threat Environment (3)
  • 02 – System Security Plan (6)
  • 03 – Planning and Policy (7)
  • 04 – Cryptography (6)
  • 05 – Secure Networks (7)
  • 06 – Firewalls (5)
  • 08 – Access Control (7)
  • 09 – Host Hardening (5)
  • 10 – Application Security (6)
  • 11 – Data Protection (4)
  • 12 – Incident and Disaster Response (5)
  • 13 – Review (1)
  • 13 – Team Project Presentations and Review for Final (1)
Fox School of Business

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in