• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Digital Systems

Department of Management Information Systems, Temple University

Digital Systems

MIS 2101.730 ■ Spring 2023 ■ Steven E. Sclarow, AIA
  • Home
  • About
    • Course Materials
    • Course Requirements
    • Email Policy
    • Grading
    • Gradebook
    • Instructor
    • Temple and COVID-19
    • Zoom Requirements
    • Zoom Links
  • Canvas Content
  • Coding Files
  • Helpdesk
  • Zoom Links
  • Video Vault
  • Diamond Peer Corner
  • Posts
    • 1a Questions
    • 1b Questions
    • 2a Questions
    • 2b Questions
    • 3a Questions
    • 3b Questions
    • 4a Questions
    • 4b Questions
    • 5a Questions
    • 5b Questions
    • 6a Questions
    • 6b Questions
    • 7a Questions

Threat Modeling 4B

Cassidy Mantle - February 28, 2023 1 Comment

Threat modeling a a type of detective that helps pickup when their are threats being made to a computer software system or infrastructure. Threat modeling is used to pick up any types of threat agents that may be detected virtually. There are many regulation requirements that need to be met with threat modeling such as risk assessment, threat mapping, threat intelligence and even asset identification. As a risk management and Insurance major, this corresponds to what I am studying because risk assessment is critical when it comes to mitigating loss exposures and in this instance, cyber risk is a major risk in itself and also comes with a lot of associated risks. Data protection and cyber security need to be regulated especially since a lot of information from individuals is absorbed through those platforms. Cyber security as well is extremely risky and their are many risks that correspond with cyber. Therefore  regulations are placed on the following subjects to help mitigate the risk exposures associated with both aspects. Ransomware is basically when a cyber network is attacked by being hacked, and hospitals tend to become a primary target in this type of risk. This is primarily because hospitals host a multitude of patients that have to turn over personal information such as their medical information, SSN, insurance info and then some which many hackers see as a attribute to their daily lives in helping them hack people’s information. Hospitals become a primary target since the patients have to turn over this personal information before being seen by the doctor or nurses. this makes it easier for attackers to target hospitals since they host such a multitude of potential cyber victims as patients. Some ways to protect yourself online is to just not engage in social media or unfamiliar platforms. Apart from that, one can choose to not engage in cyber activity or using platforms that need to obtain personal information prior to usage. Therefore if I was not born in such a internet evolving generation, I would have been more guarded about my internet usage because I have been a victim of being hacked through the internet whether it was on my social media or on a job seeking platform, both have happened to me and have caused discrepancies in my life. 

Reader Interactions

Comments

  1. Isel Sainte says

    March 1, 2023 at 2:04 pm

    Oh, hearing you say you are a risk management and Insurance major gave me chills lol. I took my first Risk course last semester, and it was hard. Hats off to you. But in regard to the rest of your post great explanations.

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

ANNOUNCEMENTS & POSTS

What is HTML and how it is used in our everyday lives! Part 2

The coding language that adds design elements to a web page is Cascading … [More...] about What is HTML and how it is used in our everyday lives! Part 2

What is HTML and how it is used in our everyday lives! Part 1

The coding language that adds structure to a web page is HTML (Hypertext … [More...] about What is HTML and how it is used in our everyday lives! Part 1

What are Loops?

Why do we use loops? Loops are used in programming to execute a set of … [More...] about What are Loops?

Importance of IF/ELSE Statements!

Why do we use if/else statements? We use if/else statements in programming … [More...] about Importance of IF/ELSE Statements!

The Functioning of JavaScript

A function in JavaScript is a block of code designed to perform a specific … [More...] about The Functioning of JavaScript

What does JavaScript mean to you? Read more to find out what it means to Shivam Joshi!

A variable in JavaScript is a container that holds a value, which can be a … [More...] about What does JavaScript mean to you? Read more to find out what it means to Shivam Joshi!

ITA CONTACT INFO

Tarisha Sarker - Diamond Peer

Email: tarisha.sarker@temple.edu
Office Hours: Monday, 3-5 PM
Zoom Link: https://temple.zoom.us/j/91454347337

Instructor

Steven E. Sclarow, AIA

Email: sclarow@temple.edu
Office Hours Availability: M | W, 9:30 - 10:30 AM, or by appointment. Please email me if you need to schedule an appointment outside of my normal office hours.
Zoom Link: https://temple.zoom.us/j/96464375557

Helpful Links

FOX Laptop Policy

Gradebook

Installing-VS-Code-Windows
Installing-VS-Code-Mac-OS

Copyright © 2025 · Department of Management Information Systems · Fox School of Business · Temple University