MIS 5214 Security Architecture Greg Senko Security Architecture - Week 6 - Application Architecture.

Slides:



Advertisements
Similar presentations
Doug Couto Information Systems and Technology Committee (ABJ50) Washington, DC January 25, 2011.
Advertisements

National Aeronautics and Space Administration NASA Mobility.
Current impacts of cloud migration on broadband network operations and businesses David Sterling Partner, i 3 m 3 Solutions.
Chapter 15: Managing Information and Technology 1.Data Versus Information 2.Managing Data 3.Types of Information Systems 4.Computer Networks 5.Data Communication.
Chapter 2 Information Technology Concepts & Issues.
Chapter 12 USING TECHNOLOGY TO ENHANCE BUSINESS PROCESSES.
IS425 Winter Session 21 IS 425 Enterprise Information LECTURE 2 Winter
POKOK BAHASAN Pertemuan 4 Matakuliah: Sistem Informasi Manajemen Tahun: 2008.
WHY STUDY SYSTEMS & ACCOUNTING ? It is fun It is a different set of skills that augments accounting MSU is the leader in accounting systems – why not study.
Information Technologies: Concepts and Management
Presenter: Vikash Nath MCP, CCNA, MCTS. On-Premise Private Cloud Public Cloud Hybrid Cloud.
Web-Enabling the Warehouse Chapter 16. Benefits of Web-Enabling a Data Warehouse Better-informed decision making Lower costs of deployment and management.
Microsoft Office Sharepoint Server 2007 (MOSS) Overview Momentum Microsoft November 15, 2007.
Oracle Confidential – Internal/Restricted/Highly RestrictedCopyright © 2014, Oracle and/or its affiliates. All rights reserved. | Oracle Identity Management.
BUILDING HYBRID APPS WITH DYNAMICS CRM & WINDOWS AZURE Guy Riddle & George Doubinski Dynamics CRM MVP’s SESSION CODE: DEV-DYN-MID306 (c) 2011 Microsoft.
PLUG IT IN 4 Cloud Computing. 1.Introduction 2.What Is Cloud Computing? 3.Different Types of Clouds 4.Cloud Computing Services 5.The Benefits of Cloud.
Sharing Geographic Content
3 Cloud Computing.
TECHNOLOGY GUIDE THREE Emerging Types of Enterprise Computing.
Dr. Michael Featherstone Intro to E-Commerce. Introduction: Administrative details Tools. My course website =
Technology Guide Three Cloud Computing. Plug IT In OUTLINE TG 3.1 Introduction TG 3.2 What Is Cloud Computing? TG 3.3 Different Types of Clouds TG 3.4.
IT Infrastructures and Emerging Technologies
Derek Slayton Sr. Director, Products Citrix Systems.
BCS, The Chartered Institute for IT Mauritius 6 th November 2012.
Delivering an Architecture for the Social Enterprise Alpesh Doshi, Fintricity Information Age Social&Mobile Business Conference Tuesday 31st January 2012.
1. 2 IT innovations in specialized areas where competitors will have difficulty copying Excellence in design of processes and activities and how they.
CMGT400 Intro to Information Assurance and Security (University of Phoenix) Lecture, Week 3 Tom Olzak, MBA, CISSP.
Dell Connected Security Solutions Simplify & unify.
COLUMBIA UNIVERSITY Department of Electrical Engineering The Fu Foundation School of Engineering and Applied Science IN THE CITY OF NEW YORK Networking.
Cloud Computing Nathan Bosen Kelsie Cagampang MIS 424 May 29, 2013.
MIS 301 Information Systems in Organizations Dave Salisbury ( )
Slide 1 of 24 Week 1: Lecture Structure Title: Managing IT –Business importance of IT –Role of CIO –Review the IS Pyramid –Top Business IT Issues –Discuss.
Marketing Information Technology in Emerging Markets: Hewlett-Packard in Latin America.
Internal apps How enterprises use mobile apps internally.
Seminar 5 Social Networks in the Web 2.0 Environment Ref: Chapter 8 – Turban and Volonino Seminar 5 Social Networks in the Web 2.0 Environment Ref: Chapter.
CIS 210 Systems Analysis and Development Week 8 Part II Designing Distributed and Internet Systems,
5/18/2006 Department of Technology Services Security Architecture.
INTRODUCTION to MIS 12/24/20151 Introduction To MIS Component Overview.
Gurprit Singh Director, Emerging Technologies Microsoft UK.
PRESENTATION TITLE Presented by: Xxxx Xxxxx. Providence Health & Services Very large Catholic healthcare system 33 hospitals in AK, CA, MT, OR, WA 65,000.
© 2010 South-Western/Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole.
University of Washington Collaboration: Identity and Access Management Lori Stevens University of Washington October 2007.
Windows Azure poDRw_Xi3Aw.
Integrating Social Media into IS/IT Courses: A Success Story to Report.
Microsoft Dynamics Application Management How the Top 10 Strategic Technology Trends for 2013 will Affect ERP Outsourcing
Short Customer Presentation September The Company  Storgrid delivers a secure software platform for creating secure file sync and sharing solutions.
MICROSOFT ENTERPRISE SOLUTIONS FOR LEADERS.  Business intelligence and Enterprise Resource Planning With powerful business intelligence and ERP solutions,
Health Management Information Systems Health Information Systems Overview Lecture b This material Comp6_Unit2b was developed by Duke University, funded.
Cloud-Computing Cloud Web-Blog Software Application Download Software.
CIS 500 Slingshot Academy / cis500.com
Trends in Emerging Technologies
Enterprise-level Identity Protection
Lecture 7 Ch.8 Web 2.0 and Social Media.
The Game has Changed… Ready or Not! Andrew Willetts Technologies, Inc.
INF 103 MART Successful Learning/inf103mart.com
Challenges facing Enterprise Mobility
Network Access Control 101 Securing the Critical Edge of Your Network
BOMGAR REMOTE SUPPORT Karl Lankford
CIS 500 HELPS Education Your Life-- cis500helps.com.
CIS 500 STUDY Lessons in Excellence-- cis500study.com.
Synthesizing knowledge During Project
Real-Time Collaboration Hub Larry Dorie CEO
3 Cloud Computing.
Collaborative Business Solutions
Awingu Boosts Profile via Social, Marketing Campaigns
The Most In-Demand Skills for Cloud Computing.
Systems & Technologies of Business Intelligence
Week1 software - Lecture outline & Assignments
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Digitization complicates visibility Market demands have taken the network beyond your perimeter Threats are more numerous and complex Threats are using.
Presentation transcript:

MIS 5214 Security Architecture Greg Senko Security Architecture - Week 6 - Application Architecture

MIS 5214 Security Architecture Greg Senko Week 6 Mid-term next week Topics in-the-news (see blog posts) Week 5 assignment: -PKI and Certificate Authority Week 6 assignment: - N-tier Architecture Week 5 Lecture: – Application Security Architecture Quiz

MIS 5214 Security Architecture Greg Senko Application Security The evolution from monolithic application architectures to Client/Server, N-tier and Service Oriented Architectures has allowed for greater responsiveness and improved user experience. But, it has complicated the job of securing application processes and data.

MIS 5214 Security Architecture Greg Senko Application Security What do we mean by “application?” Enterprise Web-facing Mobile Back Office Risks and mitigation

MIS 5214 Security Architecture Greg Senko Application Security What is an application? Program versus application Connections among programs Collaboration among users Changing expectations about data storage and system performance

MIS 5214 Security Architecture Greg Senko Application Security Enterprise Applications Within network perimeter Application-level access control Single sign-on possibilities Role- based or user based privileges

MIS 5214 Security Architecture Greg Senko Application Security The Web-facing World The interconnectedness of things (e-commerce) – customers – suppliers – partners

MIS 5214 Security Architecture Greg Senko Application Security The Emerging IoT Appliance versus application Inside the perimeter Your car/house as a computer Zero-day/sabotage Impact of open source

MIS 5214 Security Architecture Greg Senko Application Security Mobile Extension of web – Wireless – Local Custom apps Application security – Application hosted ads – Privacy versus security

MIS 5214 Security Architecture Greg Senko Application Security Back-office Applications General purpose business systems – Trends in business applications – Impact of the cloud Management Reporting – Data aggregation – Marketing analytics – Data-at-rest Application specific storage – Impact of the cloud

MIS 5214 Security Architecture Greg Senko Application Security User specific function and data access controls – Data classification – Role-based – Tool access restrictions Advanced tools – Hardwired systems – Location specific functions – Role of security architecture

MIS 5214 Security Architecture Greg Senko Quiz