• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Security Architecture

MIS 5214 - Section 001 - David Lanter

Security Architecture

MIS 5214.951 ■ Spring 2023 ■ Jose Gomez
  • Homepage
  • Instructor
  • Syllabus
  • Schedule
    • First Half of the Course
      • Unit 0a – Introduction
      • Unit 0b – The Threat Environment
      • Unit 1a – System Security Plan
      • Unit 1b – Planning and Policy
      • Unit 2a – Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident
      • Unit 2b – Cryptography
      • Unit 3a – Secure Networks
      • Unit 3b – Firewalls, Intrusion Detection and Protection Systems
    • Second Half of the Course
      • Unit 4b – Case Study 2 Data Breach at Equifax
      • Unit 5a – Access Control
      • Unit 5b Host Hardening
      • Unit 6a Application Security
      • Unit 6b Data Protection
      • Unit 7a – Incident and Disaster Response
  • Deliverables
    • Assignments
    • Case Studies
      • Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident
      • Case Study 2 – Data Breach at Equifax
    • Team Project Instructions
  • Harvard Coursepack

Boyle and Panko: Chapter 2 Planning and Policy

January 1, 2022 by Jose Gomez 2 Comments

Post your thoughtful analysis about one key point you took from this assigned reading.

Filed Under: 1b - Planning and Policy Tagged With:

Reader Interactions

Comments

  1. Chenhao Zhang says

    March 1, 2024 at 10:42 am

    Policy development and implementation: How policy is developed, what factors influence policy development, and how policy is implemented in practice.
    Planning Framework and policy: The relationship between a planning framework (such as a zoning, transportation, or land use plan) and the policies that guide its creation and implementation.
    Stakeholder engagement: The importance of involving different stakeholders in the planning and decision-making process and the impact of their input on the final outcome.
    Sustainable development and planning: how planning and policy contribute to sustainable development, environmental protection and social well-being.
    Evaluation and monitoring: Ways to assess the effectiveness of programme and policy interventions and how to modify them based on feedback and evaluation results.
    Case studies and applications: practical programming and policy implementation cases, including successes, failures and lessons learned.

    Log in to Reply
  2. Yi Liu says

    March 4, 2024 at 10:26 am

    This article focuses on the importance of planning and policy in ensuring effective computer security within corporations. It emphasizes the need for a disciplined security management process, including the Plan-Protect-Respond cycle, to address potential security threats comprehensively. The chapter also discusses the role of compliance laws and regulations, the organization of security roles within a company, risk analysis methods, and the development of a technical security architecture. Furthermore, it covers policy-driven implementation, highlighting the necessity of clear, actionable policies and the support of top management for successful security governance.

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

READINGS & CASE STUDY QUESTIONS

  • 0a – Introduction (1)
  • 0b – The Threat Environment (5)
  • 1a – System Security Plan (4)
  • 1b – Planning and Policy (4)
  • 2a – Case Study 1 (4)
  • 2b – Cryptography (4)
  • 3a – Secure Networks (5)
  • 3b – Firewalls and IDS and IPS (3)
  • 4b – Case Study 2 (4)
  • 5a – Access Control (5)
  • 5b – Host Hardening (3)
  • 6a – Application Security (4)
  • 6b – Data Protection (2)
  • 7a – Incident and Disaster Response (3)
Fox School of Business

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in