• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Protection of Information Assets

Temple University

Protection of Information Assets

MIS 5206.001 ■ Fall 2023 ■ David Lanter
  • HomePage
  • Instructor
  • Syllabus
  • Schedule
    • First Half of the Semester
      • Unit #1: Understanding an Organization’s Risk Environment
      • Unit #2: Case Study 1 – Snowfall and stolen laptop
      • Unit #2: Data Classification Process and Models
      • Unit #3: Risk Evaluation
      • Unit #4 Case #2: Autopsy of a Data Breach: The Target Case
      • Unit #5: Creating a Security Aware Organization
      • Unit #6: Physical and Environmental Security
    • Second Half of the Semester
      • Unit #8 Case Study 3 – A Hospital Catches the “Millennium Bug”
      • Unit #9: Business Continuity and Disaster Recovery Planning
      • Unit #10: Network Security
      • Unit #11: Cryptography, Public Key Encryption and Digital Signatures
      • Unit #12: Identity Management and Access Control
      • Unit #13: Computer Application Security
  • Deliverables
    • Weekly Deliverables
      • “In the News” Articles
      • Answers to Reading Discussion Questions
      • Comments on Reading Discussion Question and Other Students’ Answers
    • Case Studies
    • Team Project

Question 2

August 29, 2023 by David Lanter 10 Comments

How you would apply the FIPS 199 security categorizations to decide if each of the information security risk mitigations (“safeguards”) described in the FGDC guidelines is needed?

Filed Under: Unit 02: Data Classification Process and Models Tagged With:

Reader Interactions

Comments

  1. Nicholas Nirenberg says

    September 3, 2023 at 2:17 pm

    You could apply the FIPS 199 security categorizations to decide which of the safeguards in the FGDC guidelines are needed by identifying the potential impacts for each security objective. Once the potential impacts for each security objective is identified you can use it as an aid with the decision tree, for example, in the FGDC guidelines. This can help to understand if a safeguard is justified or not. Then, you can also use the security categorizations to identify the potential impacts if a certain safeguard was put in place. For example, what would be the impact to confidentiality, integrity, and availability, if the data would be changed or restricted? You can then decide which safeguard should be implemented and to what extent based of the potential impacts of implementing that safeguard.

    Log in to Reply
    • Jon Stillwagon says

      September 5, 2023 at 10:03 pm

      Hello Nicholas, determining if the safeguard for the data would be justified or not can help companies be more selective on which data to put safeguards on. The decision tree would be beneficial to companies in this way. I can understand how useful it could be to safeguard information and not so much of other information.

      Log in to Reply
  2. Celinemary Turner says

    September 3, 2023 at 11:45 pm

    To determine if each of the information security risk mitigation safeguards described in the Federal Geographic Data Committee (FGDC) guidelines is needed, you can apply the Federal Information Processing Standards (FIPS) Publication 199 security categorization process. Firstly, the potential impact of each security objective needed to be identified. Once the potential impacts for each security objective is identified . with the decision tree in FGDC guideline ,we can deduced if a safeguard is justified or not.Use the FIPS 199 to categorize the system or data based on the potential impact of a security breach. Assess the potential impact in terms of confidentiality, integrity, and availability. Choose the risk mitigation safeguards from the FGDC guidelines that align with the security categorization you assigned to the system or data. Ensure that the selected safeguards are relevant to the specific risks and potential consequences associated with the system or information.

    Log in to Reply
  3. Jon Stillwagon says

    September 5, 2023 at 9:18 pm

    First, decide who are the guidelines for and what kind of data is going to be measured. Determine how high confidentiality, integrity, and availability are with the information. Then I would go through the FGDC decision procedure to determine how I would handle the data. I would then use the FGDC guidelines and apply them to the information so it gets the right amount of security. It is best to align the data, confidentiality, integrity, and availability to the FGDC guidelines which will then determine the outcome of the data.

    Log in to Reply
  4. Bo Wang says

    September 10, 2023 at 3:53 pm

    First identify the potential impact of the three aspects of the target, confidentiality, integrity and availability. These potential impacts are then matched against the corresponding protective measures in the FGDC guidelines. Finally determine whether the results of the data are valid.

    Log in to Reply
  5. Yannick Rugamba says

    September 10, 2023 at 8:24 pm

    I would categorize the security levels of data using FIPS 199 to how we rate the value of items, in our homes. Just like everyday clothes require security low impact data wouldn’t need protection. On the hand important work files, categorized as impact data would need reasonable safeguards. When it comes to client information classified as high impact data it’s crucial to implement the highest level of security measures. To ensure protection I would align these categories with FGDC guidelines which act as a reference for securing our belongings. It’s all about selecting the security measures based on each level of importance; like choosing between a simple lock or a state-of-the-art security system depending on what needs safeguarding

    Log in to Reply
  6. Edge Kroll says

    September 10, 2023 at 8:26 pm

    The first objective is to assess the target using the FIPS security categorizations in order to see which safeguards must be applied. This is done by looking for the potential impacts of each security objective and comparing them to the FGDC guidelines in order to decide if the safeguard chosen was justified or not. Furthermore, other potential safeguards can be analyzed in order to assess the security impacts if a different option was chosen.

    Log in to Reply
  7. Eyup Aslanbay says

    September 11, 2023 at 8:21 pm

    For applying FIPS 199 security categorizations to determine the need for information security risk mitigations described in the FGDC guideline, the approach should be;
    Information Type Identification
    Determine Potential Impact
    Determine Overall Security Category
    Cross-Reference with FGDC Mitigations
    Review and Update

    Log in to Reply
  8. Ooreofeoluwa Koyejo says

    September 12, 2023 at 10:09 pm

    The FIPS199 security categorization of LOW, MODERATE and HIGH tags information, information types and information systems according to the level of impact a breach of security (confidentiality, integrity and availability) has on the organisation.
    The FGDC and the recommended information security risk mitigation safeguards are addressed in 3 sections. In the first section, the question of data ownership/responsibility is presented which gives context and answer to the question in the second question on the value of data by answering if the data is needed to be safeguarded and in the third section, it speaks to the type of controls/measures that will address the safeguards based on the value of the data.

    The application of the FIPS199 will be applicable in sections II and III to qualify and quantify the severity of the data based on the value from the data owner/sponsor or data analyst who requests for the safeguarding of the data. Assigning the categorization of LOW, MODERATE or HIGH to the geospatial data will inform the decisions made in the safeguard measures applied to the data.

    Log in to Reply
  9. Hashem Alsharif says

    December 9, 2023 at 2:43 pm

    To apply the FIPS 199 Security Categorizations to decide if a guideline is needed requires multiple steps. First, information needs to be observed to see where it would be categorized. Every type of information has a specific category it would belong to for locating the control. Next step would be to identify and find the need for safeguards. Based on the FIPS 199, every piece of information will have a safeguard that matches to what the security categorization has. After finding out what level of impact the systems are, which determines the level of safeguards needed, these will have to be added and monitored, which helps ensure that it’s working properly, and lastly, check for compliance. Which is important for following guidelines.

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Unit 01: Understanding an Organization's Risk Environment (5)
  • Unit 02: Case Study 1 – Snowfall and a stolen laptop (2)
  • Unit 02: Data Classification Process and Models (6)
  • Unit 03: Risk Evaluation (6)
  • Unit 04: Case Study 2 – Autopsy of a Data Breach – The Target Case (4)
  • Unit 05: Creating a Security Aware Organization (6)
  • Unit 06: Physical and Environmental Security (6)
  • Unit 08: Case Study 3 – A Hospital Catches the "Millennium Bug" (3)
  • Unit 09: Business Continuity and Disaster Recovery (6)
  • Unit 10: Network Security (6)
  • Unit 11: Cryptography, Public Key Encryption and Digital Signature (6)
  • Unit 12: Identity Management and Access Control (6)
  • Unit 13: Computer Application Security (6)
  • Welcome (1)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in