• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Security Architecture

MIS 5214 - Section 001 - David Lanter

Security Architecture

MIS 5214.951 ■ Spring 2023 ■ Jose Gomez
  • Homepage
  • Instructor
  • Syllabus
  • Schedule
    • First Half of the Course
      • Unit 0a – Introduction
      • Unit 0b – The Threat Environment
      • Unit 1a – System Security Plan
      • Unit 1b – Planning and Policy
      • Unit 2a – Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident
      • Unit 2b – Cryptography
      • Unit 3a – Secure Networks
      • Unit 3b – Firewalls, Intrusion Detection and Protection Systems
    • Second Half of the Course
      • Unit 4b – Case Study 2 Data Breach at Equifax
      • Unit 5a – Access Control
      • Unit 5b Host Hardening
      • Unit 6a Application Security
      • Unit 6b Data Protection
      • Unit 7a – Incident and Disaster Response
  • Deliverables
    • Assignments
    • Case Studies
      • Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident
      • Case Study 2 – Data Breach at Equifax
    • Team Project Instructions
  • Harvard Coursepack

4b - Case Study 2

Wrap Up

April 6, 2023 by Jose Gomez

Presentation slides

Project instructions

Filed Under: 4b - Case Study 2 Tagged With:

Question 1

March 7, 2023 by Jose Gomez

Was Equifax careless or unlucky in mitigating its vulnerabilities? In what ways were they careless or unlucky?  Explain…

(See syllabus for instructions for submitting your case study answers.)

Filed Under: 4b - Case Study 2 Tagged With:

Question 2

March 7, 2023 by Jose Gomez

How well did Equifax’s management respond to the breach?  Explain…

(See syllabus for instructions for submitting your case study answers.)

Filed Under: 4b - Case Study 2 Tagged With:

Question 3

March 7, 2023 by Jose Gomez Leave a Comment

To what extent would you hold Equifax’s Board of Directors accountable for the company’s lack of cybersecurity preparedness?  Explain…

Filed Under: 4b - Case Study 2 Tagged With:

Primary Sidebar

READINGS & CASE STUDY QUESTIONS

  • 0a – Introduction (1)
  • 0b – The Threat Environment (5)
  • 1a – System Security Plan (4)
  • 1b – Planning and Policy (4)
  • 2a – Case Study 1 (4)
  • 2b – Cryptography (4)
  • 3a – Secure Networks (5)
  • 3b – Firewalls and IDS and IPS (3)
  • 4b – Case Study 2 (4)
  • 5a – Access Control (5)
  • 5b – Host Hardening (3)
  • 6a – Application Security (4)
  • 6b – Data Protection (2)
  • 7a – Incident and Disaster Response (3)
Fox School of Business

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in