• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Cyber Security Capstone

Temple University

Cyber Security Capstone

MIS 5903.711 ■ Summer 2022 ■ William Bailey
  • HomePage
  • Instructor
  • Syllabus
  • Schedule
    • Week 01: Introduction
    • Week 02: Security and Risk Management
    • Week 03: Asset Security
    • Week 04: Security Engineering
    • Week 05: Communication and Network Security
    • Week 06: Identity and Access Management
    • Week 07: Security Assessment and Testing
    • Week 08: Security Operations
    • Week 9: Software Development Security
  • Assignments
    • Reading Assignments
    • Weekly Discussion Questions
    • In the News Article
    • Team Presentation
  • Quizzes
  • Group Project Discussion
    • Team 1 – Banking
    • Team 2 – Healthcare
    • Team 3 – Power Utility
    • Team 4 – Retail

William Bailey

Week 12: Security Threats & Mitigation

July 22, 2022 by William Bailey 33 Comments

During this last week of Discussion Questions, I would ask that you reflect that you consider at least one of the following:

  1. Which security threats did you become aware of during this capstone class?  How would you mitigate against this threat?
  2. What mitigation methods did you become aware of for the first time during this capstone class? Why is that mitigation method unique, more efficient or effective, or otherwise significant?

 

Filed Under: Week 12: IT Security Tagged With:

Week 12: In the News – Security Threats & Mitigation

July 22, 2022 by William Bailey 9 Comments

For this week’s “In the News”, locate an article that discusses one of the following:

  1. new security threats
  2. changing security threats
  3. reduced security threats?

In regards to the threats that you have identified, how does the threat change the steps that the organization would take to mitigate, or lessen, the risk from that threat?

Filed Under: Week 12: IT Security Tagged With:

Week 11: Incident Response

July 15, 2022 by William Bailey 33 Comments

Answer at least one of the following questions:

You’ve been hired as a consultant by an organization not due to a breach, but because their regulator documented a finding that the organization must redefine their Incident Response Program.

  1. How do you garner support for this effort if the organization disagrees with the regulator’s finding?
  2. What would your project plan look like if you must correct this finding prior to the next annual audit?

Filed Under: Week 11: Incident Response Tagged With:

Week 11: In the News – Incident Response

July 15, 2022 by William Bailey 9 Comments

For this week’s “In the News”, research a recent article, providing the link to the article, that describes an incident that impacted an organization.

  • How was the impact worse or reduced because of their Incident Response Program?
  • What were the strengths of their Incident Response Program?

Filed Under: Week 11: Incident Response Tagged With:

Week 10: In the News – Success or Impact of New Trends

July 8, 2022 by William Bailey 10 Comments

For this week’s In the News, research an article how an organization has improved their productivity, efficiency, or quality of their key business services by adopting one of the New Trends in Information Security.

Filed Under: Week 10: New Trends Tagged With:

Week 10: New Trends in Information Security

July 8, 2022 by William Bailey 31 Comments

This week, choose one of the following new trends, and relate what the business implications (benefit, risk, threat) of the new trend. If this is a risk or threat to the organization, why does the organization accept the risk, or what else does the organization do to minimize the threat?

  1. Cloud Computing resources
  2. Internet of Things
  3. Mobile Devices
  4. Changing Privacy Legislation

Filed Under: Week 10: New Trends Tagged With:

Week 9 : Application Development Security

July 1, 2022 by William Bailey 31 Comments

For this week’s Discussion, we consider Application (Software) Development. Answer at least one of the following questions:

  1. During which phase should Information Security be included? How would you explain to someone that Information Security has a role without a finalized product yet?
  2. Choose one of the popular software development methodologies, such as Scrum, Agile, or Waterfall; how does the choice of the methodology affect Information Security concerns?

Filed Under: Week 09: Software Development Security Tagged With:

Week 9 : In the News – Application Security

July 1, 2022 by William Bailey 11 Comments

For this week’s “In the News”, research an article dealing with how secure code development practices (or lack thereof) affected a major software project; was the project more or less successful as a result?

Filed Under: Week 09: Software Development Security Tagged With:

Week 8: In the News – Business Continuity & Disaster Recovery

June 24, 2022 by William Bailey 9 Comments

For this week’s “In the News”, research a recent article that relates how an organization was benefitted by their business continuity program, or suffered due to the lack of an adequate program? What are the key lessons learned from the article?

Filed Under: Week 08: Security Operations Tagged With:

Week 8: Business Continuity & Disaster Recovery

June 24, 2022 by William Bailey 34 Comments

Answer one of the following questions:

  1. Considering that business continuity does not support day-to-day operations until a crisis situation, how does one justify the design, implementation, maintenance, and testing for business continuity system(s)?
  2. When using third-parties, how would you gain adequate confidence in their ability to maintain availability for their systems? What techniques or solutions would you use?

Filed Under: Week 08: Security Operations Tagged With:

  • Page 1
  • Page 2
  • Page 3
  • Go to Next Page »

Primary Sidebar

Weekly Discussions

  • Week 01: Introduction (1)
  • Week 02: Security and Risk Management (2)
  • Week 03: Asset Security (2)
  • Week 04: Security Engineering (2)
  • Week 05: Communication and Network Security (2)
  • Week 06: Identity and Access Management (2)
  • Week 07: Security Assessment and Testing (2)
  • Week 08: Security Operations (2)
  • Week 09: Software Development Security (2)
  • Week 10: New Trends (2)
  • Week 11: Incident Response (2)
  • Week 12: IT Security (2)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in