• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Protection of Information Assets

Temple University

Protection of Information Assets

MIS 5206.001 ■ Fall 2023 ■ David Lanter
  • HomePage
  • Instructor
  • Syllabus
  • Schedule
    • First Half of the Semester
      • Unit #1: Understanding an Organization’s Risk Environment
      • Unit #2: Case Study 1 – Snowfall and stolen laptop
      • Unit #2: Data Classification Process and Models
      • Unit #3: Risk Evaluation
      • Unit #4 Case #2: Autopsy of a Data Breach: The Target Case
      • Unit #5: Creating a Security Aware Organization
      • Unit #6: Physical and Environmental Security
    • Second Half of the Semester
      • Unit #8 Case Study 3 – A Hospital Catches the “Millennium Bug”
      • Unit #9: Business Continuity and Disaster Recovery Planning
      • Unit #10: Network Security
      • Unit #11: Cryptography, Public Key Encryption and Digital Signatures
      • Unit #12: Identity Management and Access Control
      • Unit #13: Computer Application Security
  • Deliverables
    • Weekly Deliverables
      • “In the News” Articles
      • Answers to Reading Discussion Questions
      • Comments on Reading Discussion Question and Other Students’ Answers
    • Case Studies
    • Team Project

Question 3

November 9, 2023 by David Lanter 20 Comments

What is the one interesting point you learned from the readings this week?  Why is it interesting?

Filed Under: Unit 12: Identity Management and Access Control Tagged With:

Reader Interactions

Comments

  1. Bo Wang says

    November 12, 2023 at 3:25 pm

    The interesting point is Digital Identity Definition. Digital Identity Definition is like a online person from our identity which is similar but different. People’s definition of themselves on the Internet is often very different from the reality, which is like wearing a mask to get along with people on the Internet.

    Log in to Reply
    • Ooreofeoluwa Koyejo says

      November 12, 2023 at 11:41 pm

      This buttresses the fact that individuals can have an online profile that is different from who they are in reality.

      Log in to Reply
    • Celinemary Turner says

      November 14, 2023 at 8:29 am

      The concept of digital identity also raises privacy considerations. Individuals may intentionally separate their online and offline personas to maintain privacy or control over the information they share with different audiences.

      Log in to Reply
  2. Yannick Rugamba says

    November 12, 2023 at 3:48 pm

    One thing that caught my attention in the readings was the idea of federated identity management. What’s interesting, about it is that it makes things easier, for users by allowing them to sign in once and access platforms. Just imagine being able to log into services using your Google or Facebook credentials. Not does this simplify life for users who don’t have to remember passwords, but it also brings cost benefits to organizations. Of creating their identity systems from scratch, they can utilize existing ones. It’s an example of how our digital identities becoming more interconnected and decentralized which is reshaping the world of online security and access.

    Log in to Reply
    • Ooreofeoluwa Koyejo says

      November 12, 2023 at 11:43 pm

      While federated identity brings ease and a seamless authentication process across online accounts, it is important to note the impact of a single point of failure where unauthorized access to one account leads to exposure to all online accounts.

      Log in to Reply
      • Yannick Rugamba says

        November 13, 2023 at 8:21 pm

        Of course, You make a point mentioning the potential danger of relying solely on one point for federated identity management that I forget to mention. It serves as a reminder of the balance we must strike between convenience and security underscoring the necessity, for strong protective measures, in interconnected systems. I appreciate your insight.

        Log in to Reply
    • Jon Stillwagon says

      November 14, 2023 at 10:55 pm

      Yannick, that is an interesting point because not only can we help simplify the people who are using the device but the businesses that are creating these devices for people. If companies keep making more efficient and cost effective devices or software’s that would provide them with more business from people that will potentially create new items to help their business grow.

      Log in to Reply
  3. Celinemary Turner says

    November 12, 2023 at 6:54 pm

    One interesting point I learned from the readings this week was “Zero Trust” Architecture
    “Zero Trust” is gaining prominence in Identity and Access Management strategies. Traditionally, security models operated on the assumption that everything inside the network is trustworthy, and security measures were focused on defending the perimeter. However, in today’s complex and dynamic IT environments, the Zero Trust model challenges this assumption and treats every user and device as potentially untrusted, regardless of location.
    Why is it interesting?
    The zero-trust approach reflects a pattern shift in cybersecurity, acknowledging threats’ evolving nature and traditional security models’ limitations. It’s interesting because it challenges the conventional assumption of trusting everything inside the network.
    As cybersecurity evolves, staying informed about emerging concepts like Zero Trust is crucial.

    Log in to Reply
    • Bo Wang says

      November 13, 2023 at 9:33 pm

      This reminds me that as long as we are human, we can make mistakes, so zero trust makes sense.

      Log in to Reply
  4. Jon Stillwagon says

    November 12, 2023 at 8:24 pm

    One interesting point that I learned from the readings this week is about the silo model. When you use multiple different services and having different accounts can get tiring from the amount of personal information having to put into the system. It has become very efficient to have your information pop up and readily available to click when putting in your information. I can see it from many angles like how efficient it is and how insecure it can be if you allow someone to use your laptop or computer. It was created so that people have fewer problems with remembering their information or having to type less for elderly people who use a computer.

    Log in to Reply
    • Celinemary Turner says

      November 14, 2023 at 8:35 am

      The efficiency of having personal information readily available for various services is a key benefit of the silo model.

      Log in to Reply
  5. Edge Kroll says

    November 12, 2023 at 11:04 pm

    I think the discussion of the many different definitions of privacy was interesting. Solove’s assertion that “privacy seems to be about everything, and therefore it appears to be nothing” highlights the challenge in defining privacy across disciplines. The idea of privacy as a cluster term with conflicting definitions contributes to the lack of coherence in privacy-related studies. Lessig’s perspective on the impact of technology on the traditional boundaries between public and private spaces adds another layer to the discussion. This intricate web of perspectives, encompassing legal, economic, psychological, and technological considerations, underscores the richness and challenges inherent in the study of privacy, particularly in the context of online interactions.

    Log in to Reply
    • Celinemary Turner says

      November 14, 2023 at 8:46 am

      Your reflection on the discussion about the diverse definitions of privacy is insightful and captures the complexity of the concept.

      Log in to Reply
    • Nicholas Nirenberg says

      November 14, 2023 at 12:37 pm

      The discussion on diverse privacy definitions, including Solove’s insight that “privacy seems to be about everything, and therefore it appears to be nothing,” is intriguing. This challenges defining privacy across disciplines, contributing to study incoherence. Lessig’s view on technology impacting public-private space boundaries adds depth. I agree that this complex web of perspectives underscores the richness and challenges in studying privacy, especially in online interactions.

      Log in to Reply
  6. Ooreofeoluwa Koyejo says

    November 12, 2023 at 11:40 pm

    From my reading in chapters 52 and 59 on online privacy and identity theft respectively, I was able to draw an interesting relationship between them as a precursor/facilitator for the other.
    Online Privacy refers to the ability of individuals to control the information they disclose about themselves over the Internet and how that information is collected, used, and shared by others. Identity theft is the unauthorized use of someone’s personal information, typically for financial gain, but it can also be used for other malicious purposes. Hence, the relationship between online privacy and identity theft is essential for individuals to take proactive steps in safeguarding their personal information.

    While elements of online privacy include personal information, browsing history, and social media information, individuals share information that can be exploited by cybercriminals for common identity thefts such as financial identity theft, criminal identity theft, and medical identity theft among others.

    Log in to Reply
    • Yannick Rugamba says

      November 13, 2023 at 8:32 pm

      It’s true that when privacy practices are lacking it becomes easier for thieves to steal information. I completely agree that taking steps like being cautious with sharing information and utilizing privacy tools are crucial in preventing identity crimes. Moreover, raising awareness and promoting literacy play a role, in educating people about safe management of their online identities. The connection emphasized here underscores the importance of safeguarding privacy as a cybersecurity measure

      Log in to Reply
  7. Nicholas Nirenberg says

    November 14, 2023 at 12:18 pm

    This week’s readings introduced me to SAML in chapter 71, a crucial component in the realm of identity and access management. What makes it particularly interesting is its role in facilitating single sign-on (SSO) across different systems, enabling users to access multiple applications with a single set of credentials. The elegance of SAML lies in its ability to authenticate and authorize users without the need for transmitting sensitive information, as it relies on XML-based assertions to convey identity information securely. This not only enhances user convenience but also underscores the importance of robust security measures in today’s interconnected digital landscape.

    Log in to Reply
  8. Eyup Aslanbay says

    November 14, 2023 at 7:46 pm

    One interesting point from the reading of this week is Online Privacy is how privacy is a cluster concept with varied definitions, showing its complexity in today’s digital world. This is interesting for two main reasons.

    First one is multidisciplinary nature. Privacy isn’t just about laws or technology. It’s tied to many areas like sociology, psychology, ethics, politics, and economics. Each field views privacy differently, making it a rich topic for discussion and study.
    Second one is evolving with technology. The idea of privacy changes as technology grows. What we once thought was private is different now, thanks to social media, big data, and AI. This constant change challenges those making policies, working in tech, and everyday people.

    Log in to Reply
    • Edge Kroll says

      November 14, 2023 at 10:29 pm

      Hi Eyup,

      I agree I think your point about privacy evolving with technology is particularly interesting. The dynamic nature of privacy, influenced by advancements in social media, big data, and AI, challenges policymakers, tech professionals, and individuals alike. What was once considered private undergoes constant reevaluation in the face of technological progress. This ongoing evolution underscores the need for adaptive policies and a heightened awareness among the broader population.

      Log in to Reply
  9. Hashem Alsharif says

    December 9, 2023 at 6:30 pm

    When going over the readings, there were many points I liked however, the point that I liked the most was mentioned in chapter 52 where it talks about what the definition is of privacy. The chapter mentions how it was agreed privacy was not only a basic right, but a constitutional right as well. It then talks about how there is a distinguishable difference between information privacy and physical privacy. While this may seem like basic information to everyone, it’s important to note that the only reason why its basic to us is because people had to come up with a definition for it and how the terminology should be used. This is especially prevalent in IT where data privacy is such a high priority. We must be able to understand what privacy is in the first place.

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Unit 01: Understanding an Organization's Risk Environment (5)
  • Unit 02: Case Study 1 – Snowfall and a stolen laptop (2)
  • Unit 02: Data Classification Process and Models (6)
  • Unit 03: Risk Evaluation (6)
  • Unit 04: Case Study 2 – Autopsy of a Data Breach – The Target Case (4)
  • Unit 05: Creating a Security Aware Organization (6)
  • Unit 06: Physical and Environmental Security (6)
  • Unit 08: Case Study 3 – A Hospital Catches the "Millennium Bug" (3)
  • Unit 09: Business Continuity and Disaster Recovery (6)
  • Unit 10: Network Security (6)
  • Unit 11: Cryptography, Public Key Encryption and Digital Signature (6)
  • Unit 12: Identity Management and Access Control (6)
  • Unit 13: Computer Application Security (6)
  • Welcome (1)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in