What are 3 types of risk mitigating controls? Which is the most important? Why is it the most important?
Question 2
How you would apply the FIPS 199 security categorizations to decide if each of the information security risk mitigations (“safeguards”) described in the FGDC guidelines is needed?
Question 3
Which information security objective(s) could be put at risk if the alternative safeguards recommended by the FGDC guidelines are applied? Explain how the objective(s) is put at risk by the mitigation(s).
In the News
All Questions
Questions:
- Do ITACS students represent information security vulnerabilities to Temple University, each other, or both? Explain your answer.
- Is information security a technical problem, a business problem that the entire organization must frame and solve, or both? Explain your answer.
- What challenges are involved in performing a quantitative information security risk analysis?
Question 1
Do ITACS students represent information security vulnerabilities to Temple University, each other, or both? Explain your answer.
Question 2
Is information security a technical problem or a business problem? Explain your answer.
Question 3
What challenges are involved in performing a quantitative information security risk analysis?
Welcome!
In this course you will learn key concepts and components necessary for protecting the confidentiality, integrity and availability (CIA) of information assets. You will gain an understanding of the importance and key techniques for managing the security of information assets including logical, physical, and environmental security along with disaster recovery and business continuity.
The first half of the course, leading up to the mid-term exam, will focus on information security risk identification and management. The second half of the class will cover the details of security threats and the mitigation strategies that are used to manage risk.
Course Objectives
- Gain an overview of the nature of information security vulnerabilities and threats
- Learn how information security risks are identified, classified and prioritized
- Develop an understanding of how information security risks are managed, mitigated and controlled
- Gain experience working as part of team, developing and delivering a professional presentation
- Gain insight into certification exams and improve your test taking skills