• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Protection of Information Assets

Temple University

Protection of Information Assets

MIS 5206.701 ■ Fall 2023 ■ David Lanter
  • HomePage
  • Instructor
  • Syllabus
  • Schedule
    • First Half of the Semester
      • Unit #1: Understanding an Organization’s Risk Environment
      • Unit #2: Case Study 1 – Snowfall and stolen laptop
      • Unit #2: Data Classification Process and Models
      • Unit #3: Risk Evaluation
      • Unit #4 Case #2: Autopsy of a Data Breach: The Target Case
      • Unit #5: Creating a Security Aware Organization
      • Unit #6: Physical and Environmental Security
    • Second Half of the Semester
      • Unit #8 Case Study 3 – A Hospital Catches the “Millennium Bug”
      • Unit #9: Business Continuity and Disaster Recovery Planning
      • Unit #10: Network Security
      • Unit #11: Cryptography, Public Key Encryption and Digital Signatures
      • Unit #12: Identity Management and Access Control
      • Unit #13: Computer Application Security
  • Deliverables
    • Weekly Deliverables
      • “In the News” Articles
      • Answers to Reading Discussion Questions
      • Comments on Reading Discussion Question and Other Students’ Answers
    • Case Studies
    • Team Project
  • Zoom link

David Lanter

Wrap Up

September 27, 2023 by David Lanter

Presentation: slides

Quiz and solutions

Filed Under: Unit 05: Creating a Security Aware Organization Tagged With:

All Questions

September 21, 2023 by David Lanter Leave a Comment

  1. How do you go about developing a security education training and awareness program?
  2. Where would you recommend an organization find practical cost-effective training for its employees?
  3. How would you approach improving the security education training and awareness in an organization you know well (e.g. Temple as a student) but you will not name in your answer post and comments?

Filed Under: Unit 05: Creating a Security Aware Organization Tagged With:

Question 1

September 21, 2023 by David Lanter 32 Comments

How do you go about developing a security education training and awareness program?

Filed Under: Unit 05: Creating a Security Aware Organization Tagged With:

Question 2

September 21, 2023 by David Lanter 28 Comments

Where would you recommend an organization find practical cost-effective training for its employees?

Filed Under: Unit 05: Creating a Security Aware Organization Tagged With:

Question 3

September 21, 2023 by David Lanter 25 Comments

How would you approach improving the security education training and awareness in an organization you know well (e.g. Temple as a student) but you will not name in your answer post and comments?

Filed Under: Unit 05: Creating a Security Aware Organization Tagged With:

In The News

September 21, 2023 by David Lanter 16 Comments

Filed Under: Unit 05: Creating a Security Aware Organization Tagged With:

Wrap Up

September 20, 2023 by David Lanter

Here is the slide deck with questions for the Case Study Project Teams to answer in your presentations during class.

Filed Under: Unit 04: Case Study 2 - Autopsy of a Data Breach - The Target Case Tagged With:

Case Study 2 – Assignment

September 14, 2023 by David Lanter

Answer the following 3 questions in a way that demonstrates the depth of your understanding of the security and auditing concerns represented by the case. Your answers to the questions should be submitted to the Case 2 Assignment in Canvas. Your analysis should be single-spaced pages using 11 point Times New Roman font with one-inch margins, and the entire document should be limited to 3 pages (including the diagram for your answer to question 1.) Do not prepare a separate cover page, instead put your name, the class section number (MIS5206.001), and the case name in the top-left corner of the header. Add page numbers in the footer of the document.  Your assignment should be saved as a PDF formatted file to Canvas, your PDF file should be named Case2-YourName.pdf

Answer the following 3 questions:

1) What steps did the cybercriminals follow in committing this theft?

  • You may create  a diagram to include in your answer that illustrates the steps the cyber-criminals followed in the Target exploit and breach and the detection of the breach

2) What factors allowed this theft to take place?

3) What are the consequences of the breach for the stakeholders?

Filed Under: Unit 04: Case Study 2 - Autopsy of a Data Breach - The Target Case Tagged With:

Case Study 2 – Participation Comments

September 14, 2023 by David Lanter

This week you will not be responsible for posting comments to the answers of your classmates.  Your participation comments this week will be graded based on the performance of you and your team during the presentation of your group’s work and discussion during the class.

 

Filed Under: Unit 04: Case Study 2 - Autopsy of a Data Breach - The Target Case Tagged With:

In The News

September 14, 2023 by David Lanter 22 Comments

Filed Under: Unit 04: Case Study 2 - Autopsy of a Data Breach - The Target Case Tagged With:

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 3
  • Page 4
  • Page 5
  • Page 6
  • Page 7
  • Go to Next Page »

Primary Sidebar

Weekly Discussions

  • Unit 01: Understanding an Organization's Risk Environment (5)
  • Unit 02: Case Study 1 – Snowfall and a stolen laptop (2)
  • Unit 02: Data Classification Process and Models (6)
  • Unit 03: Risk Evaluation (6)
  • Unit 04: Case Study 2 – Autopsy of a Data Breach – The Target Case (4)
  • Unit 05: Creating a Security Aware Organization (6)
  • Unit 06: Physical and Environmental Security (6)
  • Unit 08: Case Study 3 – A Hospital Catches the "Millennium Bug" (3)
  • Unit 09: Business Continuity and Disaster Recovery (6)
  • Unit 10: Network Security (6)
  • Unit 11: Cryptography, Public Key Encryption and Digital Signature (6)
  • Unit 12: Identity Management and Access Control (6)
  • Unit 13: Computer Application Security (6)
  • Welcome (1)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in