Presentation slides
Protection of Information Assets
Temple University
by David Lanter
by David Lanter
What is meant by the term “acceptable information system security risk”? Who within the organization determines what is the acceptable level of information system risk? How does an organization determine what is an acceptable level of risk?
What is an information risk profile? How is it used? Why is it critical to the success of an organization’s risk management strategies and activities?
How would you go about creating an information risk profile for a small start-up business? Describe what the risk profile for the business would contain? How should the business use the risk profile?
by David Lanter
Unit#1a presentation: Slides
Unit#1b presentation: Slides
Note on difference between the security objectives: Integrity and Availability:
In thinking through our discussion of the possible overlap in meaning and confusion between integrity and availability, the difference between the two becomes clear when we recognize that:
Thus a loss or breach of integrity may result in an incorrect decision or mistake due to data inaccuracy or reliance on a datum or data (i.e. plural of datum) lacking authoritative sanction. In contrast, a loss of availability of information may result in inability to perform one or more tasks. A breach of either integrity or availability may lead to adverse effect on organizational operations, organizational assets, or individuals. We will continue our discussion next week in class.
by David Lanter
What are 3 types of risk mitigating controls? Which is the most important? Why is it the most important?
How you would apply the FIPS 199 security categorizations to decide if each of the information security risk mitigations (“safeguards”) described in the FGDC guidelines is needed?