• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Security Architecture

MIS 5214 - Section 001 - David Lanter

Security Architecture

MIS 5214.951 ■ Spring 2025 ■ Paul Warner
  • Home
  • Syllabus
  • Schedule
    • First Half of the Course
      • Unit 0a – Introduction
        • Welcome Introduction-WrapUp
      • Unit 0b – The Threat Environment
      • Unit 1a – System Security Plan
      • Unit 1b – Planning and Policy
      • Unit 1c – Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident
      • Unit 2a – Cryptography
      • Unit 2b – Secure Networks
      • Unit 2c – Firewalls, Intrusion Detection and Protection Systems
    • Second Half of the Course
      • Unit 3b – Case Study 2 Maersk Attack
      • Unit 3c – Access Control
      • Unit 4a – Host Hardening
      • Unit 4b Application Security
      • Unit 4c Data Protection
      • Unit 5a – Incident and Disaster Response
  • Deliverables
    • Assignments
    • Case Studies
      • Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident
      • Case Study 2 – “Cyberattack: The Maersk Global Supply-Chain Meltdown”
    • Team Project Instructions
  • Harvard Coursepack
  • NIST Publications
  • FedRAMP

Paul Warner

Boyle and Panko: Chapter 1 “The Threat Environment”

January 1, 2022 by Paul Warner 35 Comments

Post your thoughtful analysis about one key point you took from this assigned reading.

Filed Under: 0b - The Threat Environment Tagged With:

Boyle and Panko Chapter 10 Incident and Disaster Response

January 1, 2022 by Paul Warner 29 Comments

Filed Under: 5a - Incident and Disaster Response Tagged With:

OWASP Top 10

January 1, 2022 by Paul Warner 29 Comments

OWASP_Top_10-2017_(en).pdf

Filed Under: 4b - Application Security Tagged With:

Basile, C., Matteo, M.C., Mutti, S. and Paraboschi, S, “Detection of Conflicts in Security Policies”, in Vacca, J.R. (2017)

January 1, 2022 by Paul Warner 28 Comments

http://community.mis.temple.edu/mis5214sec951spring2025/files/2019/01/Vacca_Chapter55_DetectionOfConflictsInSecurityPolicies.pdf

Filed Under: 2c - Firewalls, Intrusion Detection and Protection Systems Tagged With:

NIST 800 100 Information Security Handbook Chapter 8

January 1, 2022 by Paul Warner 29 Comments

nistspecialpublication800-100

Filed Under: 0b - The Threat Environment Tagged With:

An Introduction to DDoS Distributed Denial of Service Attack

January 1, 2022 by Paul Warner 29 Comments

Filed Under: 2b - Secure Networks Tagged With:

Public Key Infrastructure and X.509 Public Key Certificates

January 1, 2022 by Paul Warner 28 Comments

PublicKeyInfrastructure_MIS5214

Filed Under: 2b - Secure Networks Tagged With:

OWASP Attack Surface Analysis Cheat Sheet

January 1, 2022 by Paul Warner 28 Comments

Filed Under: 4b - Application Security Tagged With:

Ross, J.W., Weill P., and Robertson D.C. (2008), “Implement the Operating Model Via Enterprise Architecture”

January 1, 2022 by Paul Warner 31 Comments

Post your thoughtful analysis about one key point you took from this assigned reading.

Filed Under: 0b - The Threat Environment Tagged With:

NIST 800 60 V1R1 Guide for Mapping Types of Information and Information Systems to Security Categories

January 1, 2022 by Paul Warner 29 Comments

nistspecialpublication800-60v1r1

Filed Under: 1b - Planning and Policy Tagged With:

  • « Go to Previous Page
  • Page 1
  • Page 2
  • Page 3
  • Page 4
  • Page 5
  • Page 6
  • Go to Next Page »

Primary Sidebar

READINGS & CASE STUDY QUESTIONS

  • 0a – Introduction (2)
  • 0b – The Threat Environment (6)
  • 1a – System Security Plan (4)
  • 1b – Planning and Policy (4)
  • 1c – Case Study 1 (4)
  • 2a – Cryptography (4)
  • 2b – Secure Networks (5)
  • 2c – Firewalls, Intrusion Detection and Protection Systems (3)
  • 3b – Case Study 2 (4)
  • 3c – Access Control (5)
  • 4a – Host Hardening (3)
  • 4b – Application Security (4)
  • 4c – Data Protection (2)
  • 5a – Incident and Disaster Response (3)
Fox School of Business

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in