• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Security Architecture

MIS 5214 - Section 001 - David Lanter

Security Architecture

MIS 5214.951 ■ Spring 2025 ■ Paul Warner
  • Home
  • Syllabus
  • Schedule
    • First Half of the Course
      • Unit 0a – Introduction
        • Welcome Introduction-WrapUp
      • Unit 0b – The Threat Environment
      • Unit 1a – System Security Plan
      • Unit 1b – Planning and Policy
      • Unit 1c – Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident
      • Unit 2a – Cryptography
      • Unit 2b – Secure Networks
      • Unit 2c – Firewalls, Intrusion Detection and Protection Systems
    • Second Half of the Course
      • Unit 3b – Case Study 2 Maersk Attack
      • Unit 3c – Access Control
      • Unit 4a – Host Hardening
      • Unit 4b Application Security
      • Unit 4c Data Protection
      • Unit 5a – Incident and Disaster Response
  • Deliverables
    • Assignments
    • Case Studies
      • Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident
      • Case Study 2 – “Cyberattack: The Maersk Global Supply-Chain Meltdown”
    • Team Project Instructions
  • Harvard Coursepack
  • NIST Publications
  • FedRAMP

Paul Warner

FIPS Pub 199 Standards for Security Categorization for Federal Information and Information Systems

January 1, 2022 by Paul Warner 29 Comments

NIST.FIPS.199 (1)

Filed Under: 1a - System Security Plan Tagged With:

FedRAMP System Security Plan (SSP) Low Moderate High Baseline Master Template

January 1, 2022 by Paul Warner 29 Comments

FedRAMP-SSP-Low-Baseline-Template (4)

FedRAMP-SSP-Moderate-Baseline-Template (2)

FedRAMP-SSP-High-Baseline-Template (12)

Filed Under: 1a - System Security Plan Tagged With:

NIST SP 800-18r1 “Guide for Developing Security Plans for Federal Information Systems”

January 1, 2022 by Paul Warner 29 Comments

nistspecialpublication800-18r1

Filed Under: 1a - System Security Plan Tagged With:

Boyle and Panko Module A Networking Concepts and Chapter 4 Secure Networks

January 1, 2022 by Paul Warner 30 Comments

Filed Under: 2b - Secure Networks Tagged With:

Boyle and Panko Chapter 8 Application Security

January 1, 2022 by Paul Warner 29 Comments

Filed Under: 4b - Application Security Tagged With:

Boyle and Panko Chapter 9 Data Protection

January 1, 2022 by Paul Warner 29 Comments

Filed Under: 4c - Data Protection Tagged With:

NIST 800 145 The NIST Definition of Cloud Computing

January 1, 2022 by Paul Warner 30 Comments

nistspecialpublication800-145

Filed Under: 2b - Secure Networks Tagged With:

Boyle and Panko Chapter 6 – Firewalls

January 1, 2022 by Paul Warner 29 Comments

Filed Under: 2c - Firewalls, Intrusion Detection and Protection Systems Tagged With:

Boyle and Panko: Chapter 2 Planning and Policy

January 1, 2022 by Paul Warner 29 Comments

Filed Under: 1b - Planning and Policy Tagged With:

Boyle and Panko, Chapter 3 Cryptography

January 1, 2022 by Paul Warner 29 Comments

Filed Under: 2a - Cryptography Tagged With:

  • « Go to Previous Page
  • Page 1
  • Page 2
  • Page 3
  • Page 4
  • Page 5
  • Page 6
  • Go to Next Page »

Primary Sidebar

READINGS & CASE STUDY QUESTIONS

  • 0a – Introduction (2)
  • 0b – The Threat Environment (6)
  • 1a – System Security Plan (4)
  • 1b – Planning and Policy (4)
  • 1c – Case Study 1 (4)
  • 2a – Cryptography (4)
  • 2b – Secure Networks (5)
  • 2c – Firewalls, Intrusion Detection and Protection Systems (3)
  • 3b – Case Study 2 (4)
  • 3c – Access Control (5)
  • 4a – Host Hardening (3)
  • 4b – Application Security (4)
  • 4c – Data Protection (2)
  • 5a – Incident and Disaster Response (3)
Fox School of Business

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in