• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Cyber Security Capstone

Temple University

Cyber Security Capstone

MIS 5903.711 ■ Summer 2021 ■ William Bailey
  • HomePage
  • Instructor
  • Syllabus
  • Schedule
    • Week 01: Introduction
    • Week 02: Security and Risk Management
    • Week 03: Asset Security
    • Week 04: Security Engineering
    • Week 05: Communication and Network Security
    • Week 06: Identity and Access Management
    • Week 07: Security Assessment and Testing
    • Week 08: Security Operations
    • Week 9: Software Development Security
  • Assignments
    • Reading Assignments
    • Weekly Discussion Questions
    • In the News Article
    • Team Presentation
  • Quizzes
  • Group Project Discussion
    • Team 1 – Banking
    • Team 2 – Healthcare
    • Team 3 – Power Utility
    • Team 4 – Retail

William Bailey

Week 7: In the News – Security Assessments

June 21, 2019 by William Bailey 20 Comments

For this week’s “In the News”, perform research on one of the following:

  • new testing requirements (e.g. SSAE18 SOC1 or SOC2)
  • new testing requriements put into place due to regulations
  • how security assessments and testing integrates with other domains, such as cloud network architecture, or software development lifecycle?

Filed Under: Week 07: Security Assessment and Testing Tagged With:

Week 7: Security Assessments

June 21, 2019 by William Bailey 16 Comments

As you read about security assessments, what can you conclude from this week’s readings about:

  • How often security assessments should be performed?
  • Are there factors that would decide how often you would perform these assessments?
  • Conditions that might alter that schedule?
  • What security assessments are most essential?

Filed Under: Week 07: Security Assessment and Testing Tagged With:

Week 6: Identity & Access Management

June 14, 2019 by William Bailey 18 Comments

For this week’s Discussion, consider that you want senior management to support a new Access Management program at your organization. While this may involve technology-based solutions, your budget may be limited and it is therefore essential that senior management provide support and encourage efficient use of the resources that the organization already has.

  • Why is access management critical to today’s enterprise?
  • What benefits does an enterprise gain from proper access management?

Filed Under: Week 06: Identity and Access Management Tagged With:

Week 6: In the News – Compromised Identities, Improper Use of Access

June 14, 2019 by William Bailey 15 Comments

For this week’s “In the News”, research an article that centers around how identities were compromised to provide access, or how an account that was otherwise authorized was then used for unauthorized purposes.

Filed Under: Week 06: Identity and Access Management Tagged With:

Week 5: In the News – New Developments in Communications and Network Security

June 7, 2019 by William Bailey 15 Comments

For this week’s “In the News”, research a new technology solution, or new method to utilize a previous technology, to address Communications and Network Security. How does this solution or application revolutionize networks? If this is particular to certain industries, please also include that detail.

Filed Under: Week 05: Communication and Network Security Tagged With:

Week 5: Communications and Network Security

June 7, 2019 by William Bailey 16 Comments

When designing a network for an organization, what are the key considerations that should be factored into the design?  Why do you recommend those considerations?  Also consider how you would address the inevitable situation of scarce resources; how would you prioritize?

Filed Under: Week 05: Communication and Network Security Tagged With:

Week 4: In the News – Enterprise Architecture

May 31, 2019 by William Bailey 11 Comments

For this week’s “In the News”, research and article that discusses today’s approach to Enterprise Architecture. Specifically, how has a recent organization modified their architecture to meet an acquisition, divesture, or change in business?

Filed Under: Week 04: Security Engineering Tagged With:

Week 04: Enterprise Architecture

May 31, 2019 by William Bailey 18 Comments

When designing an architecture for an organization, how do organizations best meet the needs to define reasonable permissions?

As a security practitioner, what measures would you implement to ensure that staff can perform their job duties, but minimize the risk of unauthorized use or disclosure?

 

Filed Under: Week 04: Security Engineering Tagged With:

Week 3: DQ – Protecting Privacy

May 24, 2019 by William Bailey 17 Comments

In Domain #2, we discuss Asset Security, and following on Domain #1, recall that Data (or Information) is an organization’s key asset, and that the asset may exist in various forms – not just paper, but those digital assets. Also recall that there are several factors that should be included when determining the true cost or value of the asset to the organization.

How would Data Classification and Data Retention policy help an organization protect the privacy of the customers, as well as maintain the security of the organization’s information?

Filed Under: Week 03: Asset Security Tagged With:

Week 3: In the News – Protecting Privacy

May 24, 2019 by William Bailey 19 Comments

During this week, research a recent law concerning privacy. Summarize this recent law for us:

  • What information does it protect,
  • What controls or limitations does the law specify,
  • What organizations need to comply with the law, and
  • In which regions would we need to be concerned with this law?

How does this law represent new risk(s) to the organization?

 

Filed Under: Week 03: Asset Security Tagged With:

  • « Go to Previous Page
  • Page 1
  • Page 2
  • Page 3
  • Go to Next Page »

Primary Sidebar

Weekly Discussions

  • Week 01: Introduction (1)
  • Week 02: Security and Risk Management (2)
  • Week 03: Asset Security (2)
  • Week 04: Security Engineering (2)
  • Week 05: Communication and Network Security (2)
  • Week 06: Identity and Access Management (2)
  • Week 07: Security Assessment and Testing (2)
  • Week 08: Security Operations (2)
  • Week 09: Software Development Security (2)
  • Week 10: New Trends (2)
  • Week 11: Incident Response (2)
  • Week 12: IT Security (2)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in