-
Nicholas Schratz changed their profile picture 7 years, 11 months ago
-
Adam Alalouf wrote a new post on the site Information Systems in Organizations 7 years, 11 months ago
Review Exercise
Create an ERD for the following scenario:
Katya is an employee at ABC Co. She works in the Sales Department. She has a supervisor, Chris. The ERD should capture the employee name, SSN, phone […] -
Adam Alalouf wrote a new post on the site Information Systems in Organizations 7 years, 11 months ago
Review Exercise
Model the following scenario using a swimlane diagram:
Bob is the warehouse manager of Gadgets, Inc. He is tasked with physical inventory counts. If the count is below the desired inventory […] -
Daria Gbor changed their profile picture 7 years, 11 months ago
-
Sarita Cini's profile was updated 7 years, 11 months ago
-
David Lanter wrote a new post on the site ITACS 5206 7 years, 11 months ago
Presentation: Presentation
Quiz w/solutions” Quiz w/solutions
-
David Lanter wrote a new post on the site ITACS 5206 7 years, 11 months ago
What are the 3 types of risk mitigating controls? Which is the most important? Why is it the most important?
How you would apply the FIPS security categorizations to decide if each of the information […] -
David Lanter wrote a new post on the site ITACS 5206 7 years, 11 months ago
What are the 3 types of risk mitigating controls? Which is the most important? Why is it the most important?
-
David Lanter wrote a new post on the site ITACS 5206 7 years, 11 months ago
How you would apply the FIPS security categorizations to decide if each of the information security risk mitigations (“safeguards”) described in the FGDC guidelines is needed?
-
David Lanter wrote a new post on the site ITACS 5206 7 years, 11 months ago
Which two information security objectives could be put at risk if the alternative mitigations (i.e. “safeguards”) recommended by the FGDC guidelines are applied? Explain how each of the two objective is put at […]
-
David Lanter wrote a new post on the site ITACS 5206 7 years, 11 months ago
-
David Lanter wrote a new post on the site ITACS 5206 7 years, 11 months ago
Practice Quiz:Quiz
Presentation:Slides
-
Adam Alalouf wrote a new post on the site Information Systems in Organizations 7 years, 11 months ago
Review Questions
What is IPO in computing terms?
What is Order to Cash?
What are all the entities involved in a food truck business?
What are the processes involved in such a business model?
What […] -
Charlie Corrao created the site Charles Corrao Jr 7 years, 11 months ago
-
Nicholas Schratz's profile was updated 7 years, 11 months ago
-
David Lanter wrote a new post on the site ITACS 5206 7 years, 11 months ago
Thank you for your participation in class and an excellent discussion during our first class.
Presentation: Slides
-
David Lanter wrote a new post on the site ITACS 5206 7 years, 11 months ago
Questions:
Do ITACS students represent information security vulnerabilities to Temple University, each other, or both? Explain the nature of the vulnerabilities.
Is information security a technical […]
-
David Lanter wrote a new post on the site ITACS 5206 7 years, 11 months ago
Do ITACS students represent information security vulnerabilities to Temple University, each other, or both?
Explain the nature of the vulnerabilities ITACS students represent in the context(s) you chose? -
David Lanter wrote a new post on the site ITACS 5206 7 years, 11 months ago
Is information security a technical problem, a business problem that the entire organization must frame and solve, or both? Explain the nature of the problem in the context(s) you chose.
-
David Lanter wrote a new post on the site ITACS 5206 7 years, 11 months ago
Provide an example of a measurement used in quantitative information security risk analysis.
What challenges are involved in calculating such a measurement? - Load More