• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Protection of Information Assets

Temple University

Protection of Information Assets

MIS 5206.001 ■ Fall 2021 ■ David Lanter
  • HomePage
  • Instructor
  • Syllabus
  • Schedule
    • First Half of the Semester
      • Unit #1: Understanding an Organization’s Risk Environment
      • Unit #2: Case Study 1 – Snowfall and stolen laptop
      • Unit #2: Data Classification Process and Models
      • Unit #3: Risk Evaluation
      • Unit #4 Case #2: Autopsy of a Data Breach: The Target Case
      • Unit #5: Creating a Security Aware Organization
      • Unit #6: Physical and Environmental Security
    • Second Half of the Semester
      • Unit #8 Case Study 3 – A Hospital Catches the “Millennium Bug”
      • Unit #9: Business Continuity and Disaster Recovery Planning
      • Unit #10: Network Security
      • Unit #11: Cryptography, Public Key Encryption and Digital Signatures
      • Unit #12: Identity Management and Access Control
      • Unit #13: Computer Application Security
  • Deliverables
    • Weekly Deliverables
      • “In the News” Articles
      • Answers to Reading Discussion Questions
      • Comments on Reading Discussion Question and Other Students’ Answers
    • Case Studies
    • Team Project
  • Class Capture Videos
  • Gradebook

Question 1

August 17, 2021 by David Lanter 5 Comments

Do ITACS students represent information security vulnerabilities to Temple University, each other, or both? Explain your answer.

Filed Under: Unit 01: Understanding an Organization's Risk Environment Tagged With:

Reader Interactions

Comments

  1. Elizabeth Gutierrez says

    August 24, 2021 at 9:55 pm

    While we would like to believe that ITACS students are the least likely to contribute to security vulnerabilities to Temple University or each other because of their background knowledge in technology, I see where both could be a possibility. In reality, data breaches or data loss typically is a consequence of negligent behavior by well-meaning people. It is easy to believe that you know everything about computers if you are skilled at generating spreadsheets, word processing documents, presentations, etc. However, just because you are “technologically sophisticated”, does not mean you have a full understanding of security concepts. By letting your guard down and installing software, visiting questionable sites, or opening attachments from unknown senders at the tech center, or using the university’s wifi, you are providing an “endpoint” or weak link in the security chain that can create a “front door” for hackers to take advantage of. Exposing Temple’s property to malicious software could wreak havoc on computer systems and interrupt online learning and resources, and put the university’s student and staff’s personal identifiable information in jeopardy which would impact both the university and those who benefit from the institution.

    Log in to Reply
  2. Alexander William Knoll says

    August 25, 2021 at 10:10 pm

    I would say that ITACS students represent information security vulnerabilities to Temple University and to each other. The reason I say this is because of human carelessness. While we should know better being in this major, that is not always the case. For example, I was an accounting undergrad and had little tech background before starting this program. An ITACS student could leave their computer logged in or forget their USB drive at the tech center. This could allow any stranger who walks into the tech center to have complete access to the student’s information, and even more info about Temple that they would not have otherwise had access to. A student may also accidentally download software that puts Temple’s security at risk, or click a shady email. Obviously after getting a better understanding from my first readings I would be more hesitant to make such mistakes, but it would be ignorant to say that we pose no risk whatsoever.

    Log in to Reply
  3. Yangyuan Lin says

    August 25, 2021 at 11:24 pm

    I think the ITACS students represent the information security breaches between Temple and each other. All the student groups, faculty, staff, and staff of Temple will become the target of cyberattacks. For example, phishing emails can obtain various private information of people through malicious cyberattacks, including private emails, phone numbers, bank card information, or social security. Number etc. This information may be used for illegal purposes. In addition, hackers can attack Temple’s network security to obtain more other information through the student’s private account, such as the TU account. At the same time, Temple owns the private information of each school. Once the information of students, teachers, or employees is leaked, everyone will be exposed or threatened.

    Log in to Reply
  4. Shubham Patil says

    August 26, 2021 at 3:52 pm

    ITACS students are supposed be aware of the security vulnerabilities and threats, but it is possible they can be prone to security vulnerabilities and attacks, we are humans after all and we tend to make mistakes without the intent. For example, A student might receive false alarms or notification on TU email saying that the system is infected and they need to install university recommended anti-virus software, which itself could be a malware. Another type of attack would be that the students are required to send personal information as it is required by the university for registration purposes. I feel like as cybersecurity professionals are getting evolved and trained so are the hackers or cyber criminals.

    Log in to Reply
  5. Oluwaseun Soyomokun says

    September 11, 2021 at 12:19 am

    ITACS Students may pose a vulnerability threat to Information security to Temple University in the areas concerned with intellectual property usages, exposure of unauthorized information embroiled in billions when capitalized on over the internet and breach of Temple University policies. Students can be a vulnerable target to each other in areas surrounding shoulder surfing of identity theft such as credit card numbers, personal information, however, this reason is not only limited to the poor handling of personal or personnel identifiable information electronically, and misappropriation of credentials (user profiles and passwords) granted by the Temple University for academic purposes.

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Unit 01: Understanding an Organization's Risk Environment (5)
  • Unit 02: Case Study 1 – Snowfall and a stolen laptop (6)
  • Unit 02: Data Classification Process and Models (6)
  • Unit 03: Risk Evaluation (6)
  • Unit 04: Case Study 2 – Autopsy of a Data Breach – The Target Case (4)
  • Unit 05: Creating a Security Aware Organization (6)
  • Unit 06: Physical and Environmental Security (6)
  • Unit 08: Case Study 3 – A Hospital Catches the "Millennium Bug" (6)
  • Unit 09: Business Continuity and Disaster Recovery (6)
  • Unit 10: Network Security (6)
  • Unit 11: Cryptography, Public Key Encryption and Digital Signature (6)
  • Unit 12: Identity Management and Access Control (6)
  • Unit 13: Computer Application Security (6)
  • Welcome (1)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in