• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Security Architecture

MIS 5214 - Section 001 - David Lanter

Security Architecture

MIS 5214.951 ■ Spring 2025 ■ Paul Warner
  • Home
  • Syllabus
  • Schedule
    • First Half of the Course
      • Unit 0a – Introduction
        • Welcome Introduction-WrapUp
      • Unit 0b – The Threat Environment
      • Unit 1a – System Security Plan
      • Unit 1b – Planning and Policy
      • Unit 1c – Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident
      • Unit 2a – Cryptography
      • Unit 2b – Secure Networks
      • Unit 2c – Firewalls, Intrusion Detection and Protection Systems
    • Second Half of the Course
      • Unit 3b – Case Study 2 Maersk Attack
      • Unit 3c – Access Control
      • Unit 4a – Host Hardening
      • Unit 4b Application Security
      • Unit 4c Data Protection
      • Unit 5a – Incident and Disaster Response
  • Deliverables
    • Assignments
    • Case Studies
      • Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident
      • Case Study 2 – “Cyberattack: The Maersk Global Supply-Chain Meltdown”
    • Team Project Instructions
  • Harvard Coursepack
  • NIST Publications
  • FedRAMP

Unit 2a – Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident

Found in the Harvard Business Publishing course pack.  (Links to an external site.)

Questions:

  1. Who are the major stakeholders associated with Nordic Data Grid Facility (NDGF) and UniNETT?  What critical resources are stored within the system and what concerns might stakeholders have regarding the resources?
  2. How did employees, information security (infosec) processes, and infosec tools inadvertently help the attacker succeed in breaking into Titan?
  3. What should Margrete Raaum do now? Would you suggest that Titan is ready to be turned on for local access? Is it ready to be reconnected to the computational grid?

Upload your answers to the case study questions to Canvas no later than Saturday prior to the first face to face class at midnight.

Your written answers to the questions should not exceed one single-spaced page using 11 point Times New Roman font with one-inch margins. Be sure to include each question (including number) along with the answers in your document. Do not prepare a separate cover page, instead put your name, the class section number (MIS5214.401), and the case name in the top-left corner of the header.

You will name your submitted document file and upload it to Canvas using the following file naming convention: class section number (MIS5214-BNAI), followed by an underscore (“_”), followed by your name (last-first), followed by an underscore (“_”), followed by the Case for the assignment.  For example: MIS5214-BNAI_Lanter-David_Case1.pdf

Primary Sidebar

READINGS & CASE STUDY QUESTIONS

  • 0a – Introduction (2)
  • 0b – The Threat Environment (6)
  • 1a – System Security Plan (4)
  • 1b – Planning and Policy (4)
  • 1c – Case Study 1 (4)
  • 2a – Cryptography (4)
  • 2b – Secure Networks (5)
  • 2c – Firewalls, Intrusion Detection and Protection Systems (3)
  • 3b – Case Study 2 (4)
  • 3c – Access Control (5)
  • 4a – Host Hardening (3)
  • 4b – Application Security (4)
  • 4c – Data Protection (2)
  • 5a – Incident and Disaster Response (3)
Fox School of Business

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in