• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Security Architecture

MIS 5214 - Section 001 - David Lanter

Security Architecture

MIS 5214.951 ■ Spring 2023 ■ Jose Gomez
  • Homepage
  • Instructor
  • Syllabus
  • Schedule
    • First Half of the Course
      • Unit 0a – Introduction
      • Unit 0b – The Threat Environment
      • Unit 1a – System Security Plan
      • Unit 1b – Planning and Policy
      • Unit 2a – Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident
      • Unit 2b – Cryptography
      • Unit 3a – Secure Networks
      • Unit 3b – Firewalls, Intrusion Detection and Protection Systems
    • Second Half of the Course
      • Unit 4b – Case Study 2 Data Breach at Equifax
      • Unit 5a – Access Control
      • Unit 5b Host Hardening
      • Unit 6a Application Security
      • Unit 6b Data Protection
      • Unit 7a – Incident and Disaster Response
  • Deliverables
    • Assignments
    • Case Studies
      • Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident
      • Case Study 2 – Data Breach at Equifax
    • Team Project Instructions
  • Harvard Coursepack

Basile, C., Matteo, M.C., Mutti, S. and Paraboschi, S, “Detection of Conflicts in Security Policies”, in Vacca, J.R. (2017)

January 1, 2022 by Jose Gomez 2 Comments

http://community.mis.temple.edu/mis5214sec951spring2023/files/2019/01/Vacca_Chapter55_DetectionOfConflictsInSecurityPolicies.pdf

Post your thoughtful analysis about one key point you took from this assigned reading.

 

Filed Under: 3b - Firewalls and IDS and IPS Tagged With:

Reader Interactions

Comments

  1. Chenhao Zhang says

    March 1, 2024 at 11:33 am

    A security policy is a set of rules and guidelines that govern security practices within an organization. Conflicts can arise when different policies or rules overlap or contradict each other, leading to confusion, inconsistencies, and potential security breaches.

    Log in to Reply
  2. Yi Liu says

    March 3, 2024 at 6:27 pm

    The article discusses the importance of detecting conflicts within security policies, which are crucial for maintaining the integrity and effectiveness of security measures in information systems. It highlights the various types of conflicts that can arise, such as contradictions or redundancies within security rules, and emphasizes the need for tools and approaches to identify and manage these conflicts. The focus is on improving security policy analysis to prevent anomalies and ensure that security policies are correctly implemented and enforced.
    Conflicts, such as contradictions or ambiguities in policy specifications, can lead to anomalies in the application of these policies, undermining the security of information systems. Identification, analysis, and management of conflicts within security policies need for tools that support the analysis of security policies to detect and manage these conflicts effectively.
    A proactive approach to security policy management. The insufficiency of relying solely on security designers to ensure the correctness and efficacy of security policies. Given the large size and complexity of modern security policies, the importance of automated tools and methodologies that can assist in detecting policy conflicts and managing them efficiently.

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

READINGS & CASE STUDY QUESTIONS

  • 0a – Introduction (1)
  • 0b – The Threat Environment (5)
  • 1a – System Security Plan (4)
  • 1b – Planning and Policy (4)
  • 2a – Case Study 1 (4)
  • 2b – Cryptography (4)
  • 3a – Secure Networks (5)
  • 3b – Firewalls and IDS and IPS (3)
  • 4b – Case Study 2 (4)
  • 5a – Access Control (5)
  • 5b – Host Hardening (3)
  • 6a – Application Security (4)
  • 6b – Data Protection (2)
  • 7a – Incident and Disaster Response (3)
Fox School of Business

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in