• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Security Architecture

MIS 5214 - Section 001 - David Lanter

Security Architecture

MIS 5214.951 ■ Spring 2025 ■ Paul Warner
  • Home
  • Syllabus
  • Schedule
    • First Half of the Course
      • Unit 0a – Introduction
        • Welcome Introduction-WrapUp
      • Unit 0b – The Threat Environment
      • Unit 1a – System Security Plan
      • Unit 1b – Planning and Policy
      • Unit 1c – Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident
      • Unit 2a – Cryptography
      • Unit 2b – Secure Networks
      • Unit 2c – Firewalls, Intrusion Detection and Protection Systems
    • Second Half of the Course
      • Unit 3b – Case Study 2 Maersk Attack
      • Unit 3c – Access Control
      • Unit 4a – Host Hardening
      • Unit 4b Application Security
      • Unit 4c Data Protection
      • Unit 5a – Incident and Disaster Response
  • Deliverables
    • Assignments
    • Case Studies
      • Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident
      • Case Study 2 – “Cyberattack: The Maersk Global Supply-Chain Meltdown”
    • Team Project Instructions
  • Harvard Coursepack
  • NIST Publications
  • FedRAMP

Welcome Introduction

March 14, 2025 by Paul Warner 5 Comments

Welcome Wrap-Up: Welcome-Wrap-Up

Filed Under: 0a - Introduction Tagged With:

Reader Interactions

Comments

  1. Yuqing Yin says

    March 15, 2025 at 1:20 am

    A

    Log in to Reply
  2. Yuqing Yin says

    March 15, 2025 at 1:22 am

    Each of the documents explores the case of Maersk’s cyber attack, the importance of enterprise architecture to business operations and growth, cybersecurity threats faced by enterprises, and attacks on high-performance computing clusters. CYBERATTACK: THE MAERSK GLOBAL SUPPLY-CHAIN MELTDOWN tells the story, causes and impact of the NotPetya ransomware attack on Maersk in 2017, revealing the cybersecurity weaknesses of enterprises and the challenges they face in the digital transformation process. Enterprise Architecture As Strategy – Creating a Foundation for Business Execution points out that enterprise architecture is the core of enterprise operation. By defining an operating model, designing an enterprise architecture, and adopting an IT engagement model, organizations can build a solid execution foundation for efficient operations and sustainable growth. Corporate Computer Security introduces the network security threats faced by enterprises, including the risks brought by external attacks and internal employees, and emphasizes the importance of security concepts such as confidentiality, integrity and availability, as well as the prevention, detection and corrective measures that enterprises should take. A high performance computing cluster under attack the Titan incident tells the story of the attack on the Titan cluster, analyzing the process of the attack, its impact, and the lessons learned from it. These documents show the challenges faced by enterprises in the digital age from different perspectives, involving important areas such as network security and enterprise architecture, and provide many aspects of thinking and reference for the development and safe operation of enterprises.

    Log in to Reply
  3. Kang Shao says

    March 15, 2025 at 11:52 am

    This document is an introduction to the MIS5214 Security Architecture course, covering various aspects such as course goals, websites, instructor information, and the syllabus.
    1. **Basic Course Information**: The course aims to enable students to understand how organizations align their IT security capabilities with business goals and strategies, and learn about the planning, design, etc. of security architectures. The course websites include the Class MIS Community Website and the Canvas Website. The instructor is Paul Warner, and his email is paul.warner@temple.edu.
    2. **Teaching Arrangements**: The course is divided into multiple units, covering topics such as system security plans, planning and policies, cryptography, and network security. It also includes case studies and exams. The reading materials consist of textbook chapters, NIST standard documents, and the Harvard Business Publishing Course Pack. Case studies involve incidents like a high – performance computing cluster under attack and the Equifax data breach. For the team project, students are required to work in groups to develop and present a System Security Plan (SSP) for a cloud – based enterprise information system.
    3. **Grading Criteria**: Assignments, class participation, the team project, and exams each account for 25% of the total score. Assignments require analyzing the key points of each reading material by a specified time. Class participation is evaluated based on engagement and contributions to the course content. Case studies require students to analyze security and audit issues in the cases. The team project involves the development and presentation of a system security plan, and there are mid – term and final exams.

    Log in to Reply
  4. Xinyue Zhang says

    March 16, 2025 at 1:43 am

    The documents cover diverse aspects relevant to enterprises in the digital era. One details the 2017 NotPetya ransomware attack on Maersk, highlighting its causes, impact, and the exposed cybersecurity flaws during digital transformation. Another emphasizes that enterprise architecture is fundamental for business operations and growth, with proper models enabling efficient execution. There’s also a focus on corporate computer security, addressing external and internal threats, key security concepts, and preventive/detection/corrective measures. Additionally, the story of the Titan cluster attack is told, analyzing the process, impact, and lessons. Overall, these documents offer valuable insights into network security and enterprise architecture, presenting multi – faceted perspectives for enterprises’ development and secure operations.

    Log in to Reply
  5. Ao Zhou says

    March 16, 2025 at 2:10 am

    These documents each delve into various aspects, including Maersk’s cyber attack, the significance of enterprise architecture for business operations and growth, cybersecurity threats that enterprises encounter, and attacks on high – performance computing clusters.

    “CYBERATTACK: THE MAERSK GLOBAL SUPPLY – CHAIN MELTDOWN” details the narrative, causes, and consequences of the 2017 NotPetya ransomware attack on Maersk. It exposes the cybersecurity vulnerabilities of enterprises and the difficulties they encounter during the digital transformation journey.

    “Enterprise Architecture As Strategy – Creating a Foundation for Business Execution” contends that enterprise architecture lies at the heart of enterprise operations. Through defining an operating model, devising an enterprise architecture, and implementing an IT engagement model, organizations can establish a robust foundation for efficient operations and long – term growth.

    “Corporate Computer Security” presents the network security threats that enterprises are confronted with, such as risks stemming from external assaults and internal employees. It stresses the importance of security concepts like confidentiality, integrity, and availability, along with the preventive, detective, and corrective actions that enterprises ought to take.

    “A high performance computing cluster under attack the Titan incident” recounts the attack on the Titan cluster, analyzes the attack process, its implications, and the lessons drawn from it.

    Collectively, these documents offer different viewpoints on the challenges that enterprises face in the digital era, covering crucial areas like network security and enterprise architecture. They also provide multifaceted thoughts and references for the development and secure operation of enterprises.

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

READINGS & CASE STUDY QUESTIONS

  • 0a – Introduction (2)
  • 0b – The Threat Environment (6)
  • 1a – System Security Plan (4)
  • 1b – Planning and Policy (4)
  • 1c – Case Study 1 (4)
  • 2a – Cryptography (4)
  • 2b – Secure Networks (5)
  • 2c – Firewalls, Intrusion Detection and Protection Systems (3)
  • 3b – Case Study 2 (4)
  • 3c – Access Control (5)
  • 4a – Host Hardening (3)
  • 4b – Application Security (4)
  • 4c – Data Protection (2)
  • 5a – Incident and Disaster Response (3)
Fox School of Business

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in