• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Protection of Information Assets

Temple University

Protection of Information Assets

MIS 5206.701 ■ Fall 2022 ■ William Bailey
  • HomePage
  • Instructor
  • Syllabus
  • Schedule
    • First Half of the Semester
      • Unit #1: Understanding an Organization’s Risk Environment
      • Unit #2: Case Study 1 – Snowfall and stolen laptop
      • Unit #2: Data Classification Process and Models
      • Unit #3: Risk Evaluation
      • Unit #4 Case #2: Autopsy of a Data Breach: The Target Case
      • Unit #5: Creating a Security Aware Organization
      • Unit #6: Physical and Environmental Security
    • Second Half of the Semester
      • Unit #8 Case Study 3 – A Hospital Catches the “Millennium Bug”
      • Unit #9: Business Continuity and Disaster Recovery Planning
      • Unit #10: Network Security
      • Unit #11: Cryptography, Public Key Encryption and Digital Signatures
      • Unit #12: Identity Management and Access Control
      • Unit #13: Computer Application Security
  • Deliverables
    • Weekly Deliverables
      • “In the News” Articles
      • Answers to Reading Discussion Questions
      • Comments on Reading Discussion Question and Other Students’ Answers
    • Case Studies
    • Team Project
  • Class Capture Videos

Unit #2 – Question 2

September 24, 2022 by William Bailey 1 Comment

Evaluate the steps that Dave Ballard and Nick Francesco took in response to Dean Rao’s email informing them that his laptop had been stolen.

Filed Under: Unit 02: Case Study 1 - Snowfall and a stolen laptop Tagged With:

Reader Interactions

Comments

  1. Abayomi Aiyedebinu says

    October 12, 2022 at 12:10 am

    According to the New York’s breach and notification Act, it was required that RIT notifies the
    possibly ‘affected’ individuals, so Dave Ballard informed Public Safety via mail
    (NOTIFICATION).
    • A setup was put in place to trigger an alert whenever the stolen machine connects with the
    internet as all laptops owned by RIT are configured to reach auditing servers. This is a
    benefit of the asset management system.
    • The manager of Technical services Francesco charged Dave Ballard to retrieve the serial
    numbers of the stolen laptops, reports were made to the Rochester Police, RITs Safety
    Office and pawn shops in case sale is intended.
    • A software program was installed to search for 9-digit numbers (possibly SSN’s or
    Student ID Numbers) and 16-digit numeric strings (possible credit or debit card numbers)
    and the fact that students or staff of RIT at risk of Identity Theft was ruled out, but the
    Personally Identifiable Information (PII) of the Dean and family were found on the
    machine.
    • They setup a new laptop for the Dean but because his backup is not automated but
    manual, he did not have backup for two months but was able to still retrieve important
    data using LANDesk an asset management application which maintains a record of each
    authorized user’s configuration.

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Unit 01: Understanding an Organization's Risk Environment (5)
  • Unit 02: Case Study 1 – Snowfall and a stolen laptop (6)
  • Unit 02: Data Classification Process and Models (6)
  • Unit 03: Risk Evaluation (6)
  • Unit 04: Case Study 2 – Autopsy of a Data Breach – The Target Case (4)
  • Unit 05: Creating a Security Aware Organization (6)
  • Unit 06: Physical and Environmental Security (6)
  • Unit 08: Case Study 3 – A Hospital Catches the "Millennium Bug" (3)
  • Unit 09: Business Continuity and Disaster Recovery (6)
  • Unit 10: Network Security (6)
  • Unit 11: Cryptography, Public Key Encryption and Digital Signature (6)
  • Unit 12: Identity Management and Access Control (6)
  • Unit 13: Computer Application Security (6)
  • Welcome (1)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in