• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Security Architecture

MIS 5214 - Section 001 - David Lanter

Security Architecture

MIS 5214.951 ■ Spring 2023 ■ Jose Gomez
  • Homepage
  • Instructor
  • Syllabus
  • Schedule
    • First Half of the Course
      • Unit 0a – Introduction
      • Unit 0b – The Threat Environment
      • Unit 1a – System Security Plan
      • Unit 1b – Planning and Policy
      • Unit 2a – Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident
      • Unit 2b – Cryptography
      • Unit 3a – Secure Networks
      • Unit 3b – Firewalls, Intrusion Detection and Protection Systems
    • Second Half of the Course
      • Unit 4b – Case Study 2 Data Breach at Equifax
      • Unit 5a – Access Control
      • Unit 5b Host Hardening
      • Unit 6a Application Security
      • Unit 6b Data Protection
      • Unit 7a – Incident and Disaster Response
  • Deliverables
    • Assignments
    • Case Studies
      • Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident
      • Case Study 2 – Data Breach at Equifax
    • Team Project Instructions
  • Harvard Coursepack

Jose Gomez

Boyle and Panko Module A Networking Concepts and Chapter 4 Secure Networks

January 1, 2022 by Jose Gomez 2 Comments

Post your thoughtful analysis about one key point you took from this assigned reading.

Filed Under: 3a - Secure Networks Tagged With:

Boyle and Panko Chapter 8 Application Security

January 1, 2022 by Jose Gomez 1 Comment

Post your thoughtful analysis about one key point you took from this assigned reading.

Filed Under: 6a - Application Security Tagged With:

Boyle and Panko Chapter 9 Data Protection

January 1, 2022 by Jose Gomez 1 Comment

Post your thoughtful analysis about one key point you took from this assigned reading.

Filed Under: 6b - Data Protection Tagged With:

NIST 800 145 The NIST Definition of Cloud Computing

January 1, 2022 by Jose Gomez 2 Comments

Filed Under: 3a - Secure Networks Tagged With:

Boyle and Panko Chapter 6 – Firewalls

January 1, 2022 by Jose Gomez 2 Comments

Post your thoughtful analysis about one key point you took from this assigned reading.

Filed Under: 3b - Firewalls and IDS and IPS Tagged With:

Boyle and Panko: Chapter 2 Planning and Policy

January 1, 2022 by Jose Gomez 2 Comments

Post your thoughtful analysis about one key point you took from this assigned reading.

Filed Under: 1b - Planning and Policy Tagged With:

Boyle and Panko, Chapter 3 Cryptography

January 1, 2022 by Jose Gomez 2 Comments

Post your thoughtful analysis about one key point you took from this assigned reading.

Filed Under: 2b - Cryptography Tagged With:

Boyle and Panko: Chapter 1 “The Threat Environment”

January 1, 2022 by Jose Gomez 2 Comments

Post your thoughtful analysis about one key point you took from this assigned reading.

Filed Under: 0b - The Threat Environment Tagged With:

Boyle and Panko Chapter 10 Incident and Disaster Response

January 1, 2022 by Jose Gomez 1 Comment

Post your thoughtful analysis about one key point you took from this assigned reading.

Filed Under: 7a - Incident and Disaster Response Tagged With:

OWASP Top 10

January 1, 2022 by Jose Gomez 2 Comments

Filed Under: 6a - Application Security Tagged With:

  • « Go to Previous Page
  • Page 1
  • Page 2
  • Page 3
  • Page 4
  • Page 5
  • Page 6
  • Go to Next Page »

Primary Sidebar

READINGS & CASE STUDY QUESTIONS

  • 0a – Introduction (1)
  • 0b – The Threat Environment (5)
  • 1a – System Security Plan (4)
  • 1b – Planning and Policy (4)
  • 2a – Case Study 1 (4)
  • 2b – Cryptography (4)
  • 3a – Secure Networks (5)
  • 3b – Firewalls and IDS and IPS (3)
  • 4b – Case Study 2 (4)
  • 5a – Access Control (5)
  • 5b – Host Hardening (3)
  • 6a – Application Security (4)
  • 6b – Data Protection (2)
  • 7a – Incident and Disaster Response (3)
Fox School of Business

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in