• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Protection of Information Assets

Temple University

Protection of Information Assets

MIS 5206.701 ■ Fall 2022 ■ William Bailey
  • HomePage
  • Instructor
  • Syllabus
  • Schedule
    • First Half of the Semester
      • Unit #1: Understanding an Organization’s Risk Environment
      • Unit #2: Case Study 1 – Snowfall and stolen laptop
      • Unit #2: Data Classification Process and Models
      • Unit #3: Risk Evaluation
      • Unit #4 Case #2: Autopsy of a Data Breach: The Target Case
      • Unit #5: Creating a Security Aware Organization
      • Unit #6: Physical and Environmental Security
    • Second Half of the Semester
      • Unit #8 Case Study 3 – A Hospital Catches the “Millennium Bug”
      • Unit #9: Business Continuity and Disaster Recovery Planning
      • Unit #10: Network Security
      • Unit #11: Cryptography, Public Key Encryption and Digital Signatures
      • Unit #12: Identity Management and Access Control
      • Unit #13: Computer Application Security
  • Deliverables
    • Weekly Deliverables
      • “In the News” Articles
      • Answers to Reading Discussion Questions
      • Comments on Reading Discussion Question and Other Students’ Answers
    • Case Studies
    • Team Project
  • Class Capture Videos

William Bailey

WrapUp

October 16, 2023 by William Bailey

Case Study Team-Exercise

 

Midterm Exam Review & Case Study Discussion

Filed Under: Unit 08: Case Study 3 - A Hospital Catches the "Millennium Bug" Tagged With:

Wrap Up

September 14, 2023 by William Bailey

Here is the slide deck with questions for the Case Study Project Teams to answer in your presentations during class. The slides include the listing of which team you are on.

Filed Under: Unit 04: Case Study 2 - Autopsy of a Data Breach - The Target Case Tagged With:

Wrap Up

November 18, 2022 by William Bailey

Presentation slides and video

Quiz and solutions

 

 

Filed Under: Unit 13: Computer Application Security Tagged With:

Wrap Up

November 13, 2022 by William Bailey

Presentation slides

Quiz and solutions

 

Filed Under: Unit 12: Identity Management and Access Control Tagged With:

All Questions

November 9, 2022 by William Bailey

  • What are the common/shared risks and what are the different/unique risks faced by desktop applications versus web-based applications?
  • What are secure coding practices and what risks are they intended to mitigate?
  • How would you determine if an applications development project team was using secure coding practices?

Filed Under: Unit 13: Computer Application Security Tagged With:

Question 1

November 9, 2022 by William Bailey 18 Comments

What are the common/shared risks and what are the different/unique risks faced by desktop applications versus web-based applications?

Filed Under: Unit 13: Computer Application Security Tagged With:

Question 2

November 9, 2022 by William Bailey 15 Comments

What are secure coding practices and what risks are they intended to mitigate?

Filed Under: Unit 13: Computer Application Security Tagged With:

Question 3

November 9, 2022 by William Bailey 15 Comments

How would you determine if an applications development project team was using secure coding practices?

Filed Under: Unit 13: Computer Application Security Tagged With:

In The News

November 9, 2022 by William Bailey 8 Comments

Filed Under: Unit 13: Computer Application Security Tagged With:

Wrap Up

November 7, 2022 by William Bailey

Presentation slides

Team Project details

Quiz and solutions

Filed Under: Unit 11: Cryptography, Public Key Encryption and Digital Signature Tagged With:

  • Page 1
  • Page 2
  • Page 3
  • Interim pages omitted …
  • Page 8
  • Go to Next Page »

Primary Sidebar

Weekly Discussions

  • Unit 01: Understanding an Organization's Risk Environment (5)
  • Unit 02: Case Study 1 – Snowfall and a stolen laptop (6)
  • Unit 02: Data Classification Process and Models (6)
  • Unit 03: Risk Evaluation (6)
  • Unit 04: Case Study 2 – Autopsy of a Data Breach – The Target Case (4)
  • Unit 05: Creating a Security Aware Organization (6)
  • Unit 06: Physical and Environmental Security (6)
  • Unit 08: Case Study 3 – A Hospital Catches the "Millennium Bug" (3)
  • Unit 09: Business Continuity and Disaster Recovery (6)
  • Unit 10: Network Security (6)
  • Unit 11: Cryptography, Public Key Encryption and Digital Signature (6)
  • Unit 12: Identity Management and Access Control (6)
  • Unit 13: Computer Application Security (6)
  • Welcome (1)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in