• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Security Architecture

MIS 5214 - Section 001 - David Lanter

Security Architecture

MIS 5214.951 ■ Spring 2022 ■ David Lanter
  • Homepage
  • Instructor
  • Syllabus
  • Schedule
    • First Half of the Course
      • Unit 0a – Introduction
      • Unit 0b – The Threat Environment
      • Unit 1a – System Security Plan
      • Unit 1b – Planning and Policy
      • Unit 2a – Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident
      • Unit 2b – Cryptography
      • Unit 3a – Secure Networks
      • Unit 3b – Firewalls, Intrusion Detection and Protection Systems
    • Second Half of the Course
      • Unit 4b – Case Study 2 Data Breach at Equifax
      • Unit 5a – Access Control
      • Unit 5b Host Hardening
      • Unit 6a Application Security
      • Unit 6b Data Protection
      • Unit 7a – Incident and Disaster Response
  • Deliverables
    • Assignments
    • Case Studies
      • Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident
      • Case Study 2 – Data Breach at Equifax
    • Team Project Instructions
  • Harvard Coursepack

David Lanter

An Introduction to DDoS Distributed Denial of Service Attack

January 1, 2022 by David Lanter Leave a Comment

Filed Under: 3a - Secure Networks Tagged With:

Public Key Infrastructure and X.509 Public Key Certificates

January 1, 2022 by David Lanter Leave a Comment

Filed Under: 3a - Secure Networks Tagged With:

OWASP Attack Surface Analysis Cheat Sheet

January 1, 2022 by David Lanter Leave a Comment

Filed Under: 6a - Application Security Tagged With:

Ross, J.W., Weill P., and Robertson D.C. (2008), “Implement the Operating Model Via Enterprise Architecture”

January 1, 2022 by David Lanter Leave a Comment

Post your thoughtful analysis about one key point you took from this assigned reading.

Filed Under: 0b - The Threat Environment Tagged With:

NIST 800 60 V1R1 Guide for Mapping Types of Information and Information Systems to Security Categories

January 1, 2022 by David Lanter Leave a Comment

Filed Under: 1b - Planning and Policy Tagged With:

NIST SP 800 34r1 Contingency Planning Guide for Federal Information Systems

January 1, 2022 by David Lanter Leave a Comment

Filed Under: 7a - Incident and Disaster Response Tagged With:

NIST SP 800-100, Chapter 10 “Risk Management”

January 1, 2022 by David Lanter Leave a Comment

Post your thoughtful analysis about one key point you took from this assigned reading.

Filed Under: 0b - The Threat Environment Tagged With:

FIPS 200 Minimum Security Requirements for Federal Information and Information Systems pp 1 through 9

January 1, 2022 by David Lanter Leave a Comment

Filed Under: 1b - Planning and Policy Tagged With:

Welcome to Security Architecture

January 1, 2022 by David Lanter

Course (Introduction Video MP4)

In this course you will study and learn about how organizations plan, design and develop enterprise security architecture, align their IT security capabilities with its business goals and strategy, and assess IT system security architectures and capabilities.

Objectives

  1. Learn key Enterprise Security Architecture concepts
  2. Develop an understanding of contextual, conceptual, logical, physical and component levels or security architectures and how they relate to one another
  3. Learn how security architectures are planned, designed and documented
  4. Gain an overview of how security architectures are evaluated and assessed
  5. Gain experience working as part of team, developing and delivering a professional presentation

Filed Under: 0a - Introduction Tagged With:

Boyle and Panko Chapter 7 Host Hardening

January 1, 2022 by David Lanter Leave a Comment

Filed Under: 5b - Host Hardening Tagged With:

  • « Go to Previous Page
  • Page 1
  • Page 2
  • Page 3
  • Page 4
  • Go to Next Page »

Primary Sidebar

READINGS & CASE STUDY QUESTIONS

  • 0a – Introduction (1)
  • 0b – The Threat Environment (5)
  • 1a – System Security Plan (3)
  • 1b – Planning and Policy (3)
  • 2a – Case Study 1 (3)
  • 2b – Cryptography (3)
  • 3a – Secure Networks (4)
  • 3b – Firewalls and IDS and IPS (2)
  • 4b – Case Study 2 (3)
  • 5a – Access Control (4)
  • 5b – Host Hardening (2)
  • 6a – Application Security (3)
  • 6b – Data Protection (1)
  • 7a – Incident and Disaster Response (2)
Fox School of Business

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in