• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Protection of Information Assets

Temple University

Protection of Information Assets

MIS 5206.001 ■ Fall 2023 ■ David Lanter
  • HomePage
  • Instructor
  • Syllabus
  • Schedule
    • First Half of the Semester
      • Unit #1: Understanding an Organization’s Risk Environment
      • Unit #2: Case Study 1 – Snowfall and stolen laptop
      • Unit #2: Data Classification Process and Models
      • Unit #3: Risk Evaluation
      • Unit #4 Case #2: Autopsy of a Data Breach: The Target Case
      • Unit #5: Creating a Security Aware Organization
      • Unit #6: Physical and Environmental Security
    • Second Half of the Semester
      • Unit #8 Case Study 3 – A Hospital Catches the “Millennium Bug”
      • Unit #9: Business Continuity and Disaster Recovery Planning
      • Unit #10: Network Security
      • Unit #11: Cryptography, Public Key Encryption and Digital Signatures
      • Unit #12: Identity Management and Access Control
      • Unit #13: Computer Application Security
  • Deliverables
    • Weekly Deliverables
      • “In the News” Articles
      • Answers to Reading Discussion Questions
      • Comments on Reading Discussion Question and Other Students’ Answers
    • Case Studies
    • Team Project

Unit 13: Computer Application Security

Wrap Up

November 29, 2023 by David Lanter

Presentation slides

Quiz and solutions

 

 

Filed Under: Unit 13: Computer Application Security Tagged With:

All Questions

November 16, 2023 by David Lanter

  • What are the common/shared risks and what are the different/unique risks faced by desktop applications versus web-based applications?
  • What are secure coding practices and what risks are they intended to mitigate?
  • How would you determine if an applications development project team was using secure coding practices?

Filed Under: Unit 13: Computer Application Security Tagged With:

Question 1

November 16, 2023 by David Lanter 21 Comments

What are the common/shared risks and what are the different/unique risks faced by desktop applications versus web-based applications?

Filed Under: Unit 13: Computer Application Security Tagged With:

Question 2

November 16, 2023 by David Lanter 18 Comments

What are secure coding practices and what risks are they intended to mitigate?

Filed Under: Unit 13: Computer Application Security Tagged With:

Question 3

November 16, 2023 by David Lanter 19 Comments

How would you determine if an applications development project team was using secure coding practices?

Filed Under: Unit 13: Computer Application Security Tagged With:

In The News

November 16, 2023 by David Lanter 10 Comments

Filed Under: Unit 13: Computer Application Security Tagged With:

Primary Sidebar

Weekly Discussions

  • Unit 01: Understanding an Organization's Risk Environment (5)
  • Unit 02: Case Study 1 – Snowfall and a stolen laptop (2)
  • Unit 02: Data Classification Process and Models (6)
  • Unit 03: Risk Evaluation (6)
  • Unit 04: Case Study 2 – Autopsy of a Data Breach – The Target Case (4)
  • Unit 05: Creating a Security Aware Organization (6)
  • Unit 06: Physical and Environmental Security (6)
  • Unit 08: Case Study 3 – A Hospital Catches the "Millennium Bug" (3)
  • Unit 09: Business Continuity and Disaster Recovery (6)
  • Unit 10: Network Security (6)
  • Unit 11: Cryptography, Public Key Encryption and Digital Signature (6)
  • Unit 12: Identity Management and Access Control (6)
  • Unit 13: Computer Application Security (6)
  • Welcome (1)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in