• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Security Architecture

MIS 5214 - Section 001 - David Lanter

Security Architecture

MIS 5214.951 ■ Spring 2024 ■ Jose Gomez
  • Homepage
  • Instructor
  • Syllabus
  • Schedule
    • First Half of the Course
      • Unit 0a – Introduction
      • Unit 0b – The Threat Environment
      • Unit 1a – System Security Plan
      • Unit 1b – Planning and Policy
      • Unit 2a – Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident
      • Unit 2b – Cryptography
      • Unit 3a – Secure Networks
      • Unit 3b – Firewalls, Intrusion Detection and Protection Systems
    • Second Half of the Course
      • Unit 4b – Case Study 2 Data Breach at Equifax
      • Unit 5a – Access Control
      • Unit 5b Host Hardening
      • Unit 6a Application Security
      • Unit 6b Data Protection
      • Unit 7a – Incident and Disaster Response
  • Deliverables
    • Assignments
    • Case Studies
      • Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident
      • Case Study 2 – Data Breach at Equifax
    • Team Project Instructions
  • Harvard Coursepack

Jose Gomez

NIST SP 800-18r1 “Guide for Developing Security Plans for Federal Information Systems”

January 1, 2022 by Jose Gomez 28 Comments

Filed Under: 1a - System Security Plan Tagged With:

Boyle and Panko Module A Networking Concepts and Chapter 4 Secure Networks

January 1, 2022 by Jose Gomez 25 Comments

Post your thoughtful analysis about one key point you took from this assigned reading.

Filed Under: 3a - Secure Networks Tagged With:

Boyle and Panko Chapter 8 Application Security

January 1, 2022 by Jose Gomez 25 Comments

Post your thoughtful analysis about one key point you took from this assigned reading.

Filed Under: 6a - Application Security Tagged With:

Boyle and Panko Chapter 9 Data Protection

January 1, 2022 by Jose Gomez 26 Comments

Post your thoughtful analysis about one key point you took from this assigned reading.

Filed Under: 6b - Data Protection Tagged With:

NIST 800 145 The NIST Definition of Cloud Computing

January 1, 2022 by Jose Gomez 25 Comments

Filed Under: 3a - Secure Networks Tagged With:

Boyle and Panko Chapter 6 – Firewalls

January 1, 2022 by Jose Gomez 25 Comments

Post your thoughtful analysis about one key point you took from this assigned reading.

Filed Under: 3b - Firewalls and IDS and IPS Tagged With:

Boyle and Panko: Chapter 2 Planning and Policy

January 1, 2022 by Jose Gomez 24 Comments

Post your thoughtful analysis about one key point you took from this assigned reading.

Filed Under: 1b - Planning and Policy Tagged With:

Boyle and Panko, Chapter 3 Cryptography

January 1, 2022 by Jose Gomez 25 Comments

Post your thoughtful analysis about one key point you took from this assigned reading.

Filed Under: 2b - Cryptography Tagged With:

Boyle and Panko: Chapter 1 “The Threat Environment”

January 1, 2022 by Jose Gomez 29 Comments

Post your thoughtful analysis about one key point you took from this assigned reading.

Filed Under: 0b - The Threat Environment Tagged With:

Boyle and Panko Chapter 10 Incident and Disaster Response

January 1, 2022 by Jose Gomez 26 Comments

Post your thoughtful analysis about one key point you took from this assigned reading.

Filed Under: 7a - Incident and Disaster Response Tagged With:

  • « Go to Previous Page
  • Page 1
  • Page 2
  • Page 3
  • Page 4
  • Page 5
  • Page 6
  • Go to Next Page »

Primary Sidebar

READINGS & CASE STUDY QUESTIONS

  • 0a – Introduction (1)
  • 0b – The Threat Environment (5)
  • 1a – System Security Plan (4)
  • 1b – Planning and Policy (4)
  • 2a – Case Study 1 (4)
  • 2b – Cryptography (4)
  • 3a – Secure Networks (5)
  • 3b – Firewalls and IDS and IPS (3)
  • 4b – Case Study 2 (4)
  • 5a – Access Control (5)
  • 5b – Host Hardening (3)
  • 6a – Application Security (4)
  • 6b – Data Protection (2)
  • 7a – Incident and Disaster Response (3)
Fox School of Business

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in