• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Security Architecture

MIS 5214 - Section 001 - David Lanter

Security Architecture

MIS 5214.951 ■ Spring 2025 ■ Paul Warner
  • Home
  • Syllabus
  • Schedule
    • First Half of the Course
      • Unit 0a – Introduction
        • Welcome Introduction-WrapUp
      • Unit 0b – The Threat Environment
      • Unit 1a – System Security Plan
      • Unit 1b – Planning and Policy
      • Unit 1c – Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident
      • Unit 2a – Cryptography
      • Unit 2b – Secure Networks
      • Unit 2c – Firewalls, Intrusion Detection and Protection Systems
    • Second Half of the Course
      • Unit 3b – Case Study 2 Maersk Attack
      • Unit 3c – Access Control
      • Unit 4a – Host Hardening
      • Unit 4b Application Security
      • Unit 4c Data Protection
      • Unit 5a – Incident and Disaster Response
  • Deliverables
    • Assignments
    • Case Studies
      • Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident
      • Case Study 2 – “Cyberattack: The Maersk Global Supply-Chain Meltdown”
    • Team Project Instructions
  • Harvard Coursepack
  • NIST Publications
  • FedRAMP

Paul Warner

NIST SP 800 34r1 Contingency Planning Guide for Federal Information Systems

January 1, 2022 by Paul Warner 29 Comments

nistspecialpublication800-34r1

Filed Under: 5a - Incident and Disaster Response Tagged With:

FIPS 200 Minimum Security Requirements for Federal Information and Information Systems pp 1 through 9

January 1, 2022 by Paul Warner 29 Comments

FIPS-Pub-200

Filed Under: 1b - Planning and Policy Tagged With:

Welcome to Security Architecture

January 1, 2022 by Paul Warner

Course (Introduction Video MP4)

In this course you will study and learn about how organizations plan, design and develop enterprise security architecture, align their IT security capabilities with its business goals and strategy, and assess IT system security architectures and capabilities.

Objectives

  1. Learn key Enterprise Security Architecture concepts
  2. Develop an understanding of contextual, conceptual, logical, physical and component levels or security architectures and how they relate to one another
  3. Learn how security architectures are planned, designed and documented
  4. Gain an overview of how security architectures are evaluated and assessed
  5. Gain experience working as part of team, developing and delivering a professional presentation

Filed Under: 0a - Introduction Tagged With:

Boyle and Panko Chapter 7 Host Hardening

January 1, 2022 by Paul Warner 29 Comments

Filed Under: 4a - Host Hardening Tagged With:

Boyle and Panko Chapter 5 Access Control

January 1, 2022 by Paul Warner 29 Comments

Filed Under: 3c - Access Control Tagged With:

NIST 800-123 Guide to General Server Security

January 1, 2022 by Paul Warner 29 Comments

nistspecialpublication800-123

Filed Under: 4a - Host Hardening Tagged With:

NIST SP 800 63-3 “Digital Identity Guidelines”

January 1, 2022 by Paul Warner 29 Comments

nistspecialpublication800-63-3

Filed Under: 3c - Access Control Tagged With:

NIST SP 800 63A “Digital Identity Guidelines Enrollment and Identity Proofing”

January 1, 2022 by Paul Warner 29 Comments

nistspecialpublication800-63a

Filed Under: 3c - Access Control Tagged With:

NIST SP 800 63B “Digital Identity Guidelines Authentication and Lifecycle Management”

January 1, 2022 by Paul Warner 30 Comments

nistspecialpublication800-63b

Filed Under: 3c - Access Control Tagged With:

Unit 0B Threat Environment – lecture videos and slides

January 1, 2022 by Paul Warner

Lecture slides (please refer to the MIS 5214 course syllabus for the correct schedule of units, topics and dates)

Video – Part 1

Video – Part 2

Video – Part 3

 

Filed Under: 0b - The Threat Environment Tagged With:

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 3
  • Page 4
  • Page 5
  • Page 6
  • Go to Next Page »

Primary Sidebar

READINGS & CASE STUDY QUESTIONS

  • 0a – Introduction (2)
  • 0b – The Threat Environment (6)
  • 1a – System Security Plan (4)
  • 1b – Planning and Policy (4)
  • 1c – Case Study 1 (4)
  • 2a – Cryptography (4)
  • 2b – Secure Networks (5)
  • 2c – Firewalls, Intrusion Detection and Protection Systems (3)
  • 3b – Case Study 2 (4)
  • 3c – Access Control (5)
  • 4a – Host Hardening (3)
  • 4b – Application Security (4)
  • 4c – Data Protection (2)
  • 5a – Incident and Disaster Response (3)
Fox School of Business

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in