• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Protection of Information Assets

Temple University

Protection of Information Assets

MIS 5206.001 ■ Fall 2021 ■ David Lanter
  • HomePage
  • Instructor
  • Syllabus
  • Schedule
    • First Half of the Semester
      • Unit #1: Understanding an Organization’s Risk Environment
      • Unit #2: Case Study 1 – Snowfall and stolen laptop
      • Unit #2: Data Classification Process and Models
      • Unit #3: Risk Evaluation
      • Unit #4 Case #2: Autopsy of a Data Breach: The Target Case
      • Unit #5: Creating a Security Aware Organization
      • Unit #6: Physical and Environmental Security
    • Second Half of the Semester
      • Unit #8 Case Study 3 – A Hospital Catches the “Millennium Bug”
      • Unit #9: Business Continuity and Disaster Recovery Planning
      • Unit #10: Network Security
      • Unit #11: Cryptography, Public Key Encryption and Digital Signatures
      • Unit #12: Identity Management and Access Control
      • Unit #13: Computer Application Security
  • Deliverables
    • Weekly Deliverables
      • “In the News” Articles
      • Answers to Reading Discussion Questions
      • Comments on Reading Discussion Question and Other Students’ Answers
    • Case Studies
    • Team Project
  • Class Capture Videos
  • Gradebook

In The News

November 4, 2021 by David Lanter 3 Comments

Filed Under: Unit 12: Identity Management and Access Control Tagged With:

Reader Interactions

Comments

  1. Shubham Patil says

    November 10, 2021 at 6:29 pm

    Robinhood Trading App Suffers Data Breach Exposing 7 Million Users’ Information

    The malicious third-party is believed to have socially engineered a customer service representative to gain access to internal support systems, using it to obtain the email addresses of five million users, full names for a different group of about two million people, and additional information such as names, dates of birth, and zip codes for a limited set of 310 more users.

    Link: https://thehackernews.com/2021/11/robinhood-trading-app-suffers-data.html

    Log in to Reply
    • Yangyuan Lin says

      November 10, 2021 at 10:52 pm

      Robinhood trading app hit by data breach affecting seven million

      I also saw the same news on the BBC. This time the information leak will undoubtedly have a serious impact on the company. Not just email, full name, or address, but more importantly, it also includes SSN and financial information. But Robinhood rejected the payment request and invited an external network security company to handle the matter.

      link: https://www.bbc.com/news/technology-59209494

      Log in to Reply
  2. Elizabeth Gutierrez says

    November 10, 2021 at 8:35 pm

    The following article, “The Journey to Zero Trust Begins with Identity”, was obtained via infosecurity magazine. To begin, the zero trust security model or architecture can be used by a business as a method to achieve and/or accelerate digital goals. It defies traditional security architecture because the mindset with zero trust is that anything and everything can be hacked, therefore, nothing can be trusted. Whereas traditional security relies on guarding the network perimeter, zero trust models rely on identity controls since trusted perimeters are arguably not attainable considering the expansion of new technologies. Under the principle of zero trust, all users and devices must first be authenticated and authorized before they can gain access to sensitive resources or data. Beyond the network, identity should enforce trust to users, devices, and other resources. If an organization can successfully determine their needs and have IT and security teams buy-in and adhere to zero trust principles, the model can offer numerous new benefits and capabilities to transform their security posture such as going passwordless, centralized management, dynamic risk, centralized management, etc.

    Link to article: https://www.infosecurity-magazine.com/opinions/journey-zero-trust-begins-identity/

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Unit 01: Understanding an Organization's Risk Environment (5)
  • Unit 02: Case Study 1 – Snowfall and a stolen laptop (6)
  • Unit 02: Data Classification Process and Models (6)
  • Unit 03: Risk Evaluation (6)
  • Unit 04: Case Study 2 – Autopsy of a Data Breach – The Target Case (4)
  • Unit 05: Creating a Security Aware Organization (6)
  • Unit 06: Physical and Environmental Security (6)
  • Unit 08: Case Study 3 – A Hospital Catches the "Millennium Bug" (6)
  • Unit 09: Business Continuity and Disaster Recovery (6)
  • Unit 10: Network Security (6)
  • Unit 11: Cryptography, Public Key Encryption and Digital Signature (6)
  • Unit 12: Identity Management and Access Control (6)
  • Unit 13: Computer Application Security (6)
  • Welcome (1)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in