• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Digital Systems

Department of Management Information Systems, Temple University

Digital Systems

MIS 2101.730 ■ Spring 2023 ■ Steven E. Sclarow, AIA
  • Home
  • About
    • Course Materials
    • Course Requirements
    • Email Policy
    • Grading
    • Gradebook
    • Instructor
    • Temple and COVID-19
    • Zoom Requirements
    • Zoom Links
  • Canvas Content
  • Coding Files
  • Helpdesk
  • Zoom Links
  • Video Vault
  • Diamond Peer Corner
  • Posts
    • 1a Questions
    • 1b Questions
    • 2a Questions
    • 2b Questions
    • 3a Questions
    • 3b Questions
    • 4a Questions
    • 4b Questions
    • 5a Questions
    • 5b Questions
    • 6a Questions
    • 6b Questions
    • 7a Questions

Why it is important to understand Threat Modeling

Shivam Joshi - March 3, 2023 Leave a Comment

Threat modeling is a systematic process used to identify, analyze and prioritize potential threats and vulnerabilities in a system, network or software application. This helps to identify areas where security measures need to be implemented and to develop mitigation strategies for potential risks.

Regulations involved with data protection and cybersecurity include the General Data Protection Regulation (GDPR), the California Consumer Privacy Act (CCPA), the Health Insurance Portability and Accountability Act (HIPAA) and the Payment Card Industry Data Security Standard (PCI DSS).

Ransomware is a type of malware that encrypts a victim’s files and demands payment in exchange for the decryption key. Hospitals are often targeted because they store valuable personal and medical information and may be more likely to pay the ransom to regain access to their data.

Some methods to protect yourself online include using strong and unique passwords, enabling two-factor authentication, updating software and operating systems regularly, avoiding suspicious links or emails, and using anti-virus software.

The three types of artificial intelligence are narrow AI, general AI, and super AI. Narrow AI is designed to perform specific tasks, such as voice recognition, while general AI is designed to perform a wider range of tasks like human intelligence. Super AI refers to an AI system that is capable of surpassing human intelligence in multiple domains. Examples of narrow AI include Siri and Alexa, while examples of general AI include AlphaGo and Watson.

Alan Turing was a British mathematician and computer scientist who is considered the father of modern computing. The Turing test is a measure of a machine’s ability to exhibit intelligent behavior equivalent to, or indistinguishable from, that of a human. It is used to evaluate the capability of a computer program to perform tasks that require human-level intelligence.

Reader Interactions

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

ANNOUNCEMENTS & POSTS

What is HTML and how it is used in our everyday lives! Part 2

The coding language that adds design elements to a web page is Cascading … [More...] about What is HTML and how it is used in our everyday lives! Part 2

What is HTML and how it is used in our everyday lives! Part 1

The coding language that adds structure to a web page is HTML (Hypertext … [More...] about What is HTML and how it is used in our everyday lives! Part 1

What are Loops?

Why do we use loops? Loops are used in programming to execute a set of … [More...] about What are Loops?

Importance of IF/ELSE Statements!

Why do we use if/else statements? We use if/else statements in programming … [More...] about Importance of IF/ELSE Statements!

The Functioning of JavaScript

A function in JavaScript is a block of code designed to perform a specific … [More...] about The Functioning of JavaScript

What does JavaScript mean to you? Read more to find out what it means to Shivam Joshi!

A variable in JavaScript is a container that holds a value, which can be a … [More...] about What does JavaScript mean to you? Read more to find out what it means to Shivam Joshi!

ITA CONTACT INFO

Tarisha Sarker - Diamond Peer

Email: tarisha.sarker@temple.edu
Office Hours: Monday, 3-5 PM
Zoom Link: https://temple.zoom.us/j/91454347337

Instructor

Steven E. Sclarow, AIA

Email: sclarow@temple.edu
Office Hours Availability: M | W, 9:30 - 10:30 AM, or by appointment. Please email me if you need to schedule an appointment outside of my normal office hours.
Zoom Link: https://temple.zoom.us/j/96464375557

Helpful Links

FOX Laptop Policy

Gradebook

Installing-VS-Code-Windows
Installing-VS-Code-Mac-OS

Copyright © 2026 · Department of Management Information Systems · Fox School of Business · Temple University