• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Protection of Information Assets

Temple University

Protection of Information Assets

MIS 5206.001 ■ Fall 2021 ■ David Lanter
  • HomePage
  • Instructor
  • Syllabus
  • Schedule
    • First Half of the Semester
      • Unit #1: Understanding an Organization’s Risk Environment
      • Unit #2: Case Study 1 – Snowfall and stolen laptop
      • Unit #2: Data Classification Process and Models
      • Unit #3: Risk Evaluation
      • Unit #4 Case #2: Autopsy of a Data Breach: The Target Case
      • Unit #5: Creating a Security Aware Organization
      • Unit #6: Physical and Environmental Security
    • Second Half of the Semester
      • Unit #8 Case Study 3 – A Hospital Catches the “Millennium Bug”
      • Unit #9: Business Continuity and Disaster Recovery Planning
      • Unit #10: Network Security
      • Unit #11: Cryptography, Public Key Encryption and Digital Signatures
      • Unit #12: Identity Management and Access Control
      • Unit #13: Computer Application Security
  • Deliverables
    • Weekly Deliverables
      • “In the News” Articles
      • Answers to Reading Discussion Questions
      • Comments on Reading Discussion Question and Other Students’ Answers
    • Case Studies
    • Team Project
  • Class Capture Videos
  • Gradebook

Question 2

August 17, 2021 by David Lanter 4 Comments

Is information security a technical problem or a business problem?  Explain your answer.

Filed Under: Unit 01: Understanding an Organization's Risk Environment Tagged With:

Reader Interactions

Comments

  1. Elizabeth Gutierrez says

    August 25, 2021 at 8:18 pm

    There is no question that information security is both a technical and a business problem. I would argue that it is a technical problem simply because new devices are constantly being developed such as mobiles, tablets, smart watches, etc. that are all connected to the internet, providing new avenues and devices that can be accessed by hackers. Additionally, hackers are now conducting more complex attacks facilitated by sophisticated software such as artificial intelligence and machine learning. While there are an increasing number of threats, some businesses have opted to ignore these vulnerabilities and pass the inconvenience to the IT departments; in reality, cyber security impacts the whole business, it is not exclusive to IT departments. Businesses are moving in the direction of digitalization with online banking, social media, cloud servers, etc. to make their employees’ and customer’s lives easier but many companies are not doing a good enough job at securing personal information. The consequences of a breach of loss of information could result in financial, reputational, and credibility loss which should be avoided at all costs.

    Log in to Reply
  2. Alexander William Knoll says

    August 25, 2021 at 10:34 pm

    I would argue that information security is more of a business problem. Obviously tech is constantly progressing, and it is a major part of the business world, accounting for much more of the business’ assets than in decades prior. This growth makes cyber breaches a much more complicated and dangerous issue than in it was the past. With that being said, technical problems relate to IT, and IT is a part of the business. If a business cares about maintaining its reputation and protecting its assets, it should make every effort necessary to reduce cyber risks. It can do so by training and keeping employees informed of risks, viewing the IT department as more than just a “cost center” by investing in it, etc. The issue is the entire entity’s responsibility to face, not just of the IT guy who helps set up offices.

    Log in to Reply
  3. Yangyuan Lin says

    August 25, 2021 at 11:31 pm

    Obviously, information security is not just a technical problem, especially when companies are gradually becoming digital. More companies accept customer network information transmission. Most of the customer’s information is electronically filed and stored in the company’s computer. The most obvious is that online banking and online shopping will store more customer information, including bank card information and personal information. In addition, malicious websites or network attacks will obtain the private information of customers from the company. This is not just a technical problem but also reflects the company’s emphasis on network security and protection capabilities.

    Log in to Reply
  4. Shubham Patil says

    August 26, 2021 at 4:16 pm

    It indefinitely falls under both technical and a business problem. As technology has evolved over the years, more and more businesses and enterprises have adopted the technology for their needs. In fact, consider right now how much of your business relies on technology, whether that’s emails to partners and customers, managing your social media pages, processing your payments, both from your customers and to pay your employees. The world we are in is digitalized, and threats have evolved like never before. This is not an exclusive IT job anymore due to the complexity of threats. If we want to fight against these evolved threats, we will have to think and act smart. Every individual employee has to step up and play their part in this.

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Unit 01: Understanding an Organization's Risk Environment (5)
  • Unit 02: Case Study 1 – Snowfall and a stolen laptop (6)
  • Unit 02: Data Classification Process and Models (6)
  • Unit 03: Risk Evaluation (6)
  • Unit 04: Case Study 2 – Autopsy of a Data Breach – The Target Case (4)
  • Unit 05: Creating a Security Aware Organization (6)
  • Unit 06: Physical and Environmental Security (6)
  • Unit 08: Case Study 3 – A Hospital Catches the "Millennium Bug" (6)
  • Unit 09: Business Continuity and Disaster Recovery (6)
  • Unit 10: Network Security (6)
  • Unit 11: Cryptography, Public Key Encryption and Digital Signature (6)
  • Unit 12: Identity Management and Access Control (6)
  • Unit 13: Computer Application Security (6)
  • Welcome (1)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in