• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Security Architecture

MIS 5214 - Section 001 - David Lanter

Security Architecture

MIS 5214.951 ■ Spring 2023 ■ Jose Gomez
  • Homepage
  • Instructor
  • Syllabus
  • Schedule
    • First Half of the Course
      • Unit 0a – Introduction
      • Unit 0b – The Threat Environment
      • Unit 1a – System Security Plan
      • Unit 1b – Planning and Policy
      • Unit 2a – Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident
      • Unit 2b – Cryptography
      • Unit 3a – Secure Networks
      • Unit 3b – Firewalls, Intrusion Detection and Protection Systems
    • Second Half of the Course
      • Unit 4b – Case Study 2 Data Breach at Equifax
      • Unit 5a – Access Control
      • Unit 5b Host Hardening
      • Unit 6a Application Security
      • Unit 6b Data Protection
      • Unit 7a – Incident and Disaster Response
  • Deliverables
    • Assignments
    • Case Studies
      • Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident
      • Case Study 2 – Data Breach at Equifax
    • Team Project Instructions
  • Harvard Coursepack

Unit 1b – Planning and Policy

Readings:

  • Boyle and Panko, Chapter 2 Planning and Policy
  • NIST SP 800-100 “Information Security Handbook: A Guide for Managers”, Chapter 8 – Security Planning, pp.67-77
  • NIST SP800-60V1R1: “Guide for Mapping Types of Information and Information Systems to Security Categories”, pp.1-34
  • FIPS 200 “Minimum Security Requirements for Federal Information and Information Systems”, pp.1-9

Reference:

  • NIST SP800-60V2R1: “Appendices to Guide for Mapping Types of Information and Information Systems to Security Categories”
  • NIST SP 800-53r5 “Security and Privacy Controls for Information Systems and Organizations”
  • NIST SP 800-53Ar5 “Assessing Security and Privacy Controls for Information and Information Systems”
  • NIST SP 800-53B “Control Baselines for Information Systems and Organizations”

Exercise 1:

How would you approach assessing the completeness (breadth and depth) of the Generic Information Security Policy example?

  • Generic Information Security Policy Example

Exercise 2:

Find a preliminary categorization for the following information system and adjust the categorization based on your analysis – present justifications for both preliminary and adjusted categorizations

Purpose: The system has two overarching purposes:

    1. For clients it is a system intended to help understand sewage and storm water collection and treatment systems (i.e. pipe networks, pump stations, and treatment plants) and their capacities, overflow characteristics and controls
    2. For the firm the system is intended to provide revenue through pay by clients for direct use of the service(s) of the system

Users:

    1. Municipal and regional water and sewer utilities and governmental organizations will use the system to help plan capital improvement, operations, and maintenance of sewer systems (i.e. sewage treatment plants and sewage collection networks)
    2. External consultants helping municipal and regional water and sewer utilities plan capital improvement, operations, and maintenance of sewer systems
    3. The firm’s technical information system development staff will work directly on the information system to provide, maintain, enhance and extend the services of the information system to (1) and (2)

Primary Sidebar

READINGS & CASE STUDY QUESTIONS

  • 0a – Introduction (1)
  • 0b – The Threat Environment (5)
  • 1a – System Security Plan (4)
  • 1b – Planning and Policy (4)
  • 2a – Case Study 1 (4)
  • 2b – Cryptography (4)
  • 3a – Secure Networks (5)
  • 3b – Firewalls and IDS and IPS (3)
  • 4b – Case Study 2 (4)
  • 5a – Access Control (5)
  • 5b – Host Hardening (3)
  • 6a – Application Security (4)
  • 6b – Data Protection (2)
  • 7a – Incident and Disaster Response (3)
Fox School of Business

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in