• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Protection of Information Assets

Temple University

Protection of Information Assets

MIS 5206.701 ■ Fall 2021 ■ David Lanter
  • HomePage
  • Instructor
  • Syllabus
  • Schedule
    • First Half of the Semester
      • Unit #1: Understanding an Organization’s Risk Environment
      • Unit #2: Case Study 1 – Snowfall and stolen laptop
      • Unit #2: Data Classification Process and Models
      • Unit #3: Risk Evaluation
      • Unit #4 Case #2: Autopsy of a Data Breach: The Target Case
      • Unit #5: Creating a Security Aware Organization
      • Unit #6: Physical and Environmental Security
    • Second Half of the Semester
      • Unit #8 Case Study 3 – A Hospital Catches the “Millennium Bug”
      • Unit #9: Business Continuity and Disaster Recovery Planning
      • Unit #10: Network Security
      • Unit #11: Cryptography, Public Key Encryption and Digital Signatures
      • Unit #12: Identity Management and Access Control
      • Unit #13: Computer Application Security
  • Deliverables
    • Weekly Deliverables
      • “In the News” Articles
      • Answers to Reading Discussion Questions
      • Comments on Reading Discussion Question and Other Students’ Answers
    • Case Studies
    • Team Project
  • Zoom Meetings
  • Gradebook

David Lanter

All Questions

September 1, 2021 by David Lanter

  1. What is meant by the term “acceptable information system security risk”? Who within the organization determines what is the acceptable level of information system risk? How does an organization determine what is an acceptable level of risk?
  2. What is an information risk profile? How is it used?  Why is it critical to the success of an organization’s risk management strategies and activities?
  3. How would you go about creating an information risk profile for a small start-up business? Describe what the risk profile for the business would contain?  How should the business use the risk profile?

Filed Under: Unit 03: Risk Evaluation Tagged With:

Question 1

September 1, 2021 by David Lanter 62 Comments

What is meant by the term “acceptable information system security risk”? Who within the organization determines what is the acceptable level of information system risk? How does an organization determine what is an acceptable level of risk?

Filed Under: Unit 03: Risk Evaluation Tagged With:

Question 2

September 1, 2021 by David Lanter 58 Comments

What is an information risk profile? How is it used?  Why is it critical to the success of an organization’s risk management strategies and activities?

Filed Under: Unit 03: Risk Evaluation Tagged With:

Question 3

September 1, 2021 by David Lanter 61 Comments

How would you go about creating an information risk profile for a small start-up business? Describe what the risk profile for the business would contain?  How should the business use the risk profile?

Filed Under: Unit 03: Risk Evaluation Tagged With:

In the News

September 1, 2021 by David Lanter 35 Comments

Filed Under: Unit 03: Risk Evaluation Tagged With:

Wrap Up

August 25, 2021 by David Lanter

Unit#1a presentation: Slides

Unit#1b presentation: Slides

 

Note on difference between the security objectives: Integrity and Availability:

In thinking through our discussion of the possible overlap in meaning and confusion between integrity and availability, the difference between the two becomes clear when we recognize that:

  • Integrity of information implies trust in the validity, correctness, and authorized value of each datum (i.e. single data value) of information
  • Availability of information implies physical/virtual ability to access and use information.

Thus a loss or breach of integrity may result in an incorrect decision or mistake due to data inaccuracy or reliance on a datum or data (i.e. plural of datum) lacking authoritative sanction. In contrast, a loss of availability of information may result in inability to perform one or more tasks.  A breach of either integrity or availability may lead to adverse effect on organizational operations, organizational assets, or individuals. We will continue our discussion next week in class.

 

 

Filed Under: Unit 01: Understanding an Organization's Risk Environment Tagged With:

All Questions

August 25, 2021 by David Lanter

  1. What are 3 types of risk mitigating controls? Which is the most important?  Why is it the most important?
  2. How you would apply the FIPS 199 security categorizations to decide if each of the information security risk mitigations (“safeguards”) described in the FGDC guidelines is needed?
  3. Which information security objective(s) could be put at risk if the alternative safeguards recommended by the FGDC guidelines are applied?  Explain how the objective(s) is put at risk by the mitigation(s).

Filed Under: Unit 02: Data Classification Process and Models Tagged With:

Question 1

August 25, 2021 by David Lanter 60 Comments

What are 3 types of risk mitigating controls? Which is the most important?  Why is it the most important?

Filed Under: Unit 02: Data Classification Process and Models Tagged With:

Question 2

August 25, 2021 by David Lanter 41 Comments

How you would apply the FIPS 199 security categorizations to decide if each of the information security risk mitigations (“safeguards”) described in the FGDC guidelines is needed?

Filed Under: Unit 02: Data Classification Process and Models Tagged With:

Question 3

August 25, 2021 by David Lanter 47 Comments

Which information security objective(s) could be put at risk if the alternative safeguards recommended by the FGDC guidelines are applied?  Explain how the objective(s) is put at risk by the mitigation(s).

Filed Under: Unit 02: Data Classification Process and Models Tagged With:

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 5
  • Page 6
  • Page 7
  • Page 8
  • Go to Next Page »

Primary Sidebar

Weekly Discussions

  • Unit 01: Understanding an Organization's Risk Environment (5)
  • Unit 02: Case Study 1 – Snowfall and a stolen laptop (6)
  • Unit 02: Data Classification Process and Models (6)
  • Unit 03: Risk Evaluation (6)
  • Unit 04: Case Study 2 – Autopsy of a Data Breach – The Target Case (4)
  • Unit 05: Creating a Security Aware Organization (6)
  • Unit 06: Physical and Environmental Security (6)
  • Unit 08: Case Study 3 – A Hospital Catches the "Millennium Bug" (6)
  • Unit 09: Business Continuity and Disaster Recovery (6)
  • Unit 10: Network Security (6)
  • Unit 11: Cryptography, Public Key Encryption and Digital Signature (6)
  • Unit 12: Identity Management and Access Control (6)
  • Unit 13: Computer Application Security (6)
  • Welcome (1)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in