• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Protection of Information Assets

Temple University

Protection of Information Assets

MIS 5206.701 ■ Fall 2023 ■ David Lanter
  • HomePage
  • Instructor
  • Syllabus
  • Schedule
    • First Half of the Semester
      • Unit #1: Understanding an Organization’s Risk Environment
      • Unit #2: Case Study 1 – Snowfall and stolen laptop
      • Unit #2: Data Classification Process and Models
      • Unit #3: Risk Evaluation
      • Unit #4 Case #2: Autopsy of a Data Breach: The Target Case
      • Unit #5: Creating a Security Aware Organization
      • Unit #6: Physical and Environmental Security
    • Second Half of the Semester
      • Unit #8 Case Study 3 – A Hospital Catches the “Millennium Bug”
      • Unit #9: Business Continuity and Disaster Recovery Planning
      • Unit #10: Network Security
      • Unit #11: Cryptography, Public Key Encryption and Digital Signatures
      • Unit #12: Identity Management and Access Control
      • Unit #13: Computer Application Security
  • Deliverables
    • Weekly Deliverables
      • “In the News” Articles
      • Answers to Reading Discussion Questions
      • Comments on Reading Discussion Question and Other Students’ Answers
    • Case Studies
    • Team Project
  • Zoom link

David Lanter

Question 1

August 30, 2023 by David Lanter 34 Comments

What are 3 types of risk mitigating controls? Which is the most important?  Why is it the most important?

Filed Under: Unit 02: Data Classification Process and Models Tagged With:

Question 2

August 30, 2023 by David Lanter 25 Comments

How you would apply the FIPS 199 security categorizations to decide if each of the information security risk mitigations (“safeguards”) described in the FGDC guidelines is needed?

Filed Under: Unit 02: Data Classification Process and Models Tagged With:

Question 3

August 30, 2023 by David Lanter 24 Comments

Which information security objective(s) could be put at risk if the alternative safeguards recommended by the FGDC guidelines are applied?  Explain how the objective(s) is put at risk by the mitigation(s).

Filed Under: Unit 02: Data Classification Process and Models Tagged With:

In the News

August 30, 2023 by David Lanter 22 Comments

Filed Under: Unit 02: Data Classification Process and Models Tagged With:

All Questions

August 11, 2023 by David Lanter

Questions:

  1. Do ITACS students represent information security vulnerabilities to Temple University, each other, or both? Explain your answer.
  2. Is information security a technical problem, a business problem that the entire organization must frame and solve, or both? Explain your answer.
  3. What challenges are involved in performing a quantitative information security risk analysis?

Filed Under: Unit 01: Understanding an Organization's Risk Environment Tagged With:

Question 1

August 11, 2023 by David Lanter 25 Comments

Do ITACS students represent information security vulnerabilities to Temple University, each other, or both? Explain your answer.

Filed Under: Unit 01: Understanding an Organization's Risk Environment Tagged With:

Question 2

August 11, 2023 by David Lanter 18 Comments

Is information security a technical problem or a business problem?  Explain your answer.

Filed Under: Unit 01: Understanding an Organization's Risk Environment Tagged With:

Question 3

August 11, 2023 by David Lanter 20 Comments

What challenges are involved in performing a quantitative information security risk analysis?

Filed Under: Unit 01: Understanding an Organization's Risk Environment Tagged With:

Welcome!

August 1, 2023 by David Lanter

In this course you will learn key concepts and components necessary for protecting the confidentiality, integrity and availability (CIA) of information assets. You will gain an understanding of the importance and key techniques for managing the security of information assets including logical, physical, and environmental security along with disaster recovery and business continuity.

The first half of the course, leading up to the mid-term exam, will focus on information security risk identification and management. The second half of the class will cover the details of security threats and the mitigation strategies that are used to manage risk.

Course Objectives

  1. Gain an overview of the nature of information security vulnerabilities and threats
  2. Learn how information security risks are identified, classified and prioritized
  3. Develop an understanding of how information security risks are managed, mitigated and controlled
  4. Gain experience working as part of team, developing and delivering a professional presentation
  5. Gain insight into certification exams and improve your test taking skills

Filed Under: Welcome Tagged With:

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 5
  • Page 6
  • Page 7

Primary Sidebar

Weekly Discussions

  • Unit 01: Understanding an Organization's Risk Environment (5)
  • Unit 02: Case Study 1 – Snowfall and a stolen laptop (2)
  • Unit 02: Data Classification Process and Models (6)
  • Unit 03: Risk Evaluation (6)
  • Unit 04: Case Study 2 – Autopsy of a Data Breach – The Target Case (4)
  • Unit 05: Creating a Security Aware Organization (6)
  • Unit 06: Physical and Environmental Security (6)
  • Unit 08: Case Study 3 – A Hospital Catches the "Millennium Bug" (3)
  • Unit 09: Business Continuity and Disaster Recovery (6)
  • Unit 10: Network Security (6)
  • Unit 11: Cryptography, Public Key Encryption and Digital Signature (6)
  • Unit 12: Identity Management and Access Control (6)
  • Unit 13: Computer Application Security (6)
  • Welcome (1)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in