• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Digital Systems

Department of Management Information Systems, Temple University

Digital Systems

MIS 2101.730 ■ Spring 2023 ■ Steven E. Sclarow, AIA
  • Home
  • About
    • Course Materials
    • Course Requirements
    • Email Policy
    • Grading
    • Gradebook
    • Instructor
    • Temple and COVID-19
    • Zoom Requirements
    • Zoom Links
  • Canvas Content
  • Coding Files
  • Helpdesk
  • Zoom Links
  • Video Vault
  • Diamond Peer Corner
  • Posts
    • 1a Questions
    • 1b Questions
    • 2a Questions
    • 2b Questions
    • 3a Questions
    • 3b Questions
    • 4a Questions
    • 4b Questions
    • 5a Questions
    • 5b Questions
    • 6a Questions
    • 6b Questions
    • 7a Questions

Threat modeling and Cybersecurity. 4B

Leonid Kovalchuk - March 1, 2023 1 Comment

Threat modeling is the process of defining and analyzing assets, identifying potential threats and assessing the likelihood that these threats could exploit those assets. It requires a comprehensive understanding of the system, its components, architecture, available security controls, and other security considerations. The goal of threat modeling is to identify and prioritize areas of risk that need to be addressed by security controls.

Regulations involved with data protection and cybersecurity:

  1. The General Data Protection Regulation (GDPR)
  2. The Data Protection Act
  3. The California Consumer Privacy Act (CCPA)
  4. Health Insurance Portability and Accountability Act (HIPAA)
  5. Payment Card Industry Data Security Standard (PCI DSS)

Ransomware is a type of computer malware that restricts access to the victim’s data by encrypting it and demands a ransom payment in order to decrypt and regain access. Hospitals are often targeted because medical records and other personal data are highly valuable on the black market. Hospitals also have a greater incentive to pay the extortion fee since the alternative could potentially be a disruption of critical medical services.

  1. Use strong passwords and two-factor authentication: Choose passwords that are at least 8 characters long and include a combination of numbers, symbols, and upper- and lower-case letters. Consider using two-factor authentication to add an extra layer of security to your accounts.
  2. Keep your operating system and security software up to date: Regularly update your operating system and security software to protect against the latest threats.

Alan Turing was a British mathematician, computer scientist, and theoretical biologist. He is credited as being the father of modern computer science and artificial intelligence. The Turing Test is a test used to determine whether or not a computer is able to exhibit intelligent behavior equivalent to, or indistinguishable from, that of a human. It was developed by Turing in 1950, and it works by having a human judge interact with two parties at the same time – one being a human and the other being a computer. The judge must determine which is which based solely on their conversation with the two.

Reader Interactions

Comments

  1. Jessica Giare says

    March 2, 2023 at 11:43 am

    Hi Leonid! I think you did a great job explaining this topic. I think that these factors should always be a high priority on the list for businesses. Cybersecurity is no joke and protecting your data should be a top priority in all cases. As we have previously talked about how hospitals are top suspects for ransomware, I always think of other places that should be taking their cybersecurity very seriously like doctor’s offices, wellness centers, and more. I personally had an experience where my cybersecurity was hacked and the money that was taken wasn’t even high amounts but taken more frequently. For example, they would take 15 dollars but they would take it 10 separate times to get what they wanted. It’s crazy to see how many methods there really are to take money from someone and breaking cybersecurity.

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

ANNOUNCEMENTS & POSTS

What is HTML and how it is used in our everyday lives! Part 2

The coding language that adds design elements to a web page is Cascading … [More...] about What is HTML and how it is used in our everyday lives! Part 2

What is HTML and how it is used in our everyday lives! Part 1

The coding language that adds structure to a web page is HTML (Hypertext … [More...] about What is HTML and how it is used in our everyday lives! Part 1

What are Loops?

Why do we use loops? Loops are used in programming to execute a set of … [More...] about What are Loops?

Importance of IF/ELSE Statements!

Why do we use if/else statements? We use if/else statements in programming … [More...] about Importance of IF/ELSE Statements!

The Functioning of JavaScript

A function in JavaScript is a block of code designed to perform a specific … [More...] about The Functioning of JavaScript

What does JavaScript mean to you? Read more to find out what it means to Shivam Joshi!

A variable in JavaScript is a container that holds a value, which can be a … [More...] about What does JavaScript mean to you? Read more to find out what it means to Shivam Joshi!

ITA CONTACT INFO

Tarisha Sarker - Diamond Peer

Email: tarisha.sarker@temple.edu
Office Hours: Monday, 3-5 PM
Zoom Link: https://temple.zoom.us/j/91454347337

Instructor

Steven E. Sclarow, AIA

Email: sclarow@temple.edu
Office Hours Availability: M | W, 9:30 - 10:30 AM, or by appointment. Please email me if you need to schedule an appointment outside of my normal office hours.
Zoom Link: https://temple.zoom.us/j/96464375557

Helpful Links

FOX Laptop Policy

Gradebook

Installing-VS-Code-Windows
Installing-VS-Code-Mac-OS

Copyright © 2025 · Department of Management Information Systems · Fox School of Business · Temple University