• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Security Architecture

MIS 5214 - Section 001 - David Lanter

Security Architecture

MIS 5214.951 ■ Spring 2023 ■ Jose Gomez
  • Homepage
  • Instructor
  • Syllabus
  • Schedule
    • First Half of the Course
      • Unit 0a – Introduction
      • Unit 0b – The Threat Environment
      • Unit 1a – System Security Plan
      • Unit 1b – Planning and Policy
      • Unit 2a – Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident
      • Unit 2b – Cryptography
      • Unit 3a – Secure Networks
      • Unit 3b – Firewalls, Intrusion Detection and Protection Systems
    • Second Half of the Course
      • Unit 4b – Case Study 2 Data Breach at Equifax
      • Unit 5a – Access Control
      • Unit 5b Host Hardening
      • Unit 6a Application Security
      • Unit 6b Data Protection
      • Unit 7a – Incident and Disaster Response
  • Deliverables
    • Assignments
    • Case Studies
      • Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident
      • Case Study 2 – Data Breach at Equifax
    • Team Project Instructions
  • Harvard Coursepack

Boyle and Panko: Chapter 1 “The Threat Environment”

January 1, 2022 by Jose Gomez 2 Comments

Post your thoughtful analysis about one key point you took from this assigned reading.

Filed Under: 0b - The Threat Environment Tagged With:

Reader Interactions

Comments

  1. Chenhao Zhang says

    March 1, 2024 at 9:42 am

    Environmental threats usually refer to external factors that adversely affect the audit process and results. These threats can arise from a variety of sources, including technology, policy, regulation, and economics, and can negatively impact the effectiveness, accuracy, and reliability of audit work. Here are some common threats to the IT audit environment:
    Technical threats: With the rapid development of information technology, new technologies and tools continue to emerge, which may bring new challenges to audit work. For example, the application of cloud computing, big data, artificial intelligence and other technologies may make traditional audit methods and technologies obsolete, requiring auditors to constantly update their knowledge and skills.
    Policy and regulatory threats: Changes in policies and regulations may have a significant impact on audit work. For example, new regulations may require auditors to adopt new audit methods or reporting formats, while policy changes may result in some audit projects not being carried out or inaccurate results.
    Economic threats: Changes in the economic environment may also have an impact on audit work. For example, an economic downturn may cause a company to struggle and increase audit risk; The economic recovery may bring new investment opportunities and business models, creating new challenges for audit work.
    Data security threats: Data security is an important concern in IT audits. Security events such as data leakage, tampering, or loss may cause audit results to be distorted or invalid, which has a serious impact on audit work.
    Supply chain threats: In a complex supply chain environment, supplier or partner issues can also have an impact on audit efforts. For example, a vendor’s software or hardware has vulnerabilities or defects that could make the audit results inaccurate or unenforceable.
    To address these environmental threats, auditors need to remain sensitive to new technologies, new regulations and new economic environments, and constantly update their knowledge and skills. At the same time, it is also necessary to strengthen data security management and supply chain risk management to ensure the effectiveness and reliability of audit work.

    Log in to Reply
  2. Yi Liu says

    March 4, 2024 at 9:57 am

    1、Employee and Ex-Employee Threats: It covers the risks associated with both current and former employees, including sabotage, hacking, financial theft, intellectual property theft, extortion, harassment, and various forms of computer and internet abuse.
    2、Malware: The chapter details different types of malware, such as viruses, worms, blended threats, trojan horses, root kits, spyware, and the role of social engineering in malware propagation. It also touches upon spam, phishing, spear-phishing, and hoaxes.
    3、Hackers and Attacks: This part examines the motives behind hacking, the anatomy of a hack, target selection, reconnaissance probes, exploits, spoofing, and the use of social engineering in attacks. It also discusses denial-of-service attacks and the varying skill levels among hackers.
    4、The Criminal Era: This section highlights the shift towards criminal-dominated cyber threats, discussing cybercrime, international gangs, black markets, market specialization, fraud, theft, extortion, and the theft of sensitive data about customers and employees.

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

READINGS & CASE STUDY QUESTIONS

  • 0a – Introduction (1)
  • 0b – The Threat Environment (5)
  • 1a – System Security Plan (4)
  • 1b – Planning and Policy (4)
  • 2a – Case Study 1 (4)
  • 2b – Cryptography (4)
  • 3a – Secure Networks (5)
  • 3b – Firewalls and IDS and IPS (3)
  • 4b – Case Study 2 (4)
  • 5a – Access Control (5)
  • 5b – Host Hardening (3)
  • 6a – Application Security (4)
  • 6b – Data Protection (2)
  • 7a – Incident and Disaster Response (3)
Fox School of Business

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in