• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Protection of Information Assets

Temple University

Protection of Information Assets

MIS 5206.701 ■ Fall 2024 ■ David Lanter
  • HomePage
  • Instructor
  • Syllabus
  • Schedule
    • First Half of the Semester
      • Unit #1: Understanding an Organization’s Risk Environment
      • Unit #2: Case Study 1 – Snowfall and stolen laptop
      • Unit #2: Data Classification Process and Models
      • Unit #3: Risk Evaluation
      • Unit #4 Case #2: Autopsy of a Data Breach: The Target Case
      • Unit #5: Creating a Security Aware Organization
      • Unit #6: Physical and Environmental Security
    • Second Half of the Semester
      • Unit #8 Case Study 3 – A Hospital Catches the “Millennium Bug”
      • Unit #9: Business Continuity and Disaster Recovery Planning
      • Unit #10: Network Security
      • Unit #11: Cryptography, Public Key Encryption and Digital Signatures
      • Unit #12: Identity Management and Access Control
      • Unit #13: Computer Application Security
  • Deliverables
    • Weekly Deliverables
      • “In the News” Articles
      • Answers to Reading Discussion Questions
      • Comments on Reading Discussion Question and Other Students’ Answers
    • Case Studies
    • Team Project
  • Zoom link

David Lanter

All Questions

October 9, 2024 by David Lanter

Here is the link to Case Study 3: A Hospital Catches the “Millennium Bug”

  1. Based on the facts presented in the case, how far had Fetcher-Allen progressed in identifying and mitigating their Y2K bug risks by June, 1998? (Explain your reasoning supported by specific evidence from the case study.)
  2. How likely is it that Fletcher-Allen would have achieved full-year 2000 compliance by December 31, 1999?  (Explain your reasoning.)
  3. At the end of the case, Sadlemire observes, “This project sometimes plays second fiddle to other projects that I believe are less critical.”  What “other projects” do you think he is referring to here? What advice would you give Sadlemire to help him address this issue of conflicting priorities?

Post your answers to the questions as a PDF document to Canvas following the instructions in the syllabus . Your analysis should be single-spaced pages using 11 point Times New Roman font with one-inch margins, and the entire document should be limited to 3 pages (including the diagram for your answer to question Do not prepare a separate cover page, instead put your name, the class section number (e.g. MIS5206.001 or MIS5206.701), and the case name in the top-left corner of the header. Add page numbers in the footer of the document.  Your assignment should be saved as a PDF formatted file to Canvas, your PDF file should be named Case3-YourName.pdf

Filed Under: Unit 08: Case Study 3 - A Hospital Catches the "Millennium Bug" Tagged With:

In The News

October 9, 2024 by David Lanter 13 Comments

Filed Under: Unit 08: Case Study 3 - A Hospital Catches the "Millennium Bug" Tagged With:

Wrap Up

October 2, 2024 by David Lanter

Presentation slides

Quiz and solutions

Filed Under: Unit 06: Physical and Environmental Security Tagged With:

Unit #6 – All Questions

September 25, 2024 by David Lanter

  1. What physical security risks are created by an organization’s implementation of a PHYSBITS solution? What mitigations would you recommend to lesson them?
  2. For an organization choosing among Denver Colorado, Miami Florida, Redlands California and Tulsa Oklahoma, from a physical security perspective – where would be the best place to locate their data center?  Why is this place better and the other places worse?
  3. A company’s physical security team analyzed physical security threats and vulnerabilities for its systems. What types of vulnerabilities did the company focus on?

Filed Under: Unit 06: Physical and Environmental Security Tagged With:

Unit #6 – Question 1

September 25, 2024 by David Lanter 26 Comments

What physical security risks are created by an organization’s implementation of a PHYSBITS solution? What mitigations would you recommend to lesson them?

Use this link for the reference to Physical Security Bridge to IT Security PHYSBITS

 

Filed Under: Unit 06: Physical and Environmental Security Tagged With:

Unit #6 – Question 2

September 25, 2024 by David Lanter 34 Comments

For an organization choosing among Denver Colorado, Miami Florida, Redlands California and Tulsa Oklahoma, from a physical security perspective – where would be the best place to locate their data center?  Why is this place better and the other places worse?

Filed Under: Unit 06: Physical and Environmental Security Tagged With:

Unit #6 – Question 3

September 25, 2024 by David Lanter 31 Comments

A company’s physical security team analyzed physical security threats and vulnerabilities for its systems. What types of vulnerabilities did the company focus on?

Filed Under: Unit 06: Physical and Environmental Security Tagged With:

Unit #6 – In The News

September 25, 2024 by David Lanter 14 Comments

Filed Under: Unit 06: Physical and Environmental Security Tagged With:

Wrap Up

September 25, 2024 by David Lanter

Presentation: slides

Quiz and solutions

Filed Under: Unit 05: Creating a Security Aware Organization Tagged With:

All Questions

September 18, 2024 by David Lanter Leave a Comment

  1. How do you go about developing a security education training and awareness program?
  2. Where would you recommend an organization find practical cost-effective training for its employees?
  3. How would you approach improving the security education training and awareness in an organization you know well (e.g. Temple as a student) but you will not name in your answer post and comments?

Filed Under: Unit 05: Creating a Security Aware Organization Tagged With:

  • « Go to Previous Page
  • Page 1
  • Page 2
  • Page 3
  • Page 4
  • Page 5
  • Page 6
  • Page 7
  • Go to Next Page »

Primary Sidebar

Weekly Discussions

  • Unit 01: Understanding an Organization's Risk Environment (5)
  • Unit 02: Case Study 1 – Snowfall and a stolen laptop (1)
  • Unit 02: Data Classification Process and Models (6)
  • Unit 03: Risk Evaluation (6)
  • Unit 04: Case Study 2 – Autopsy of a Data Breach – The Target Case (4)
  • Unit 05: Creating a Security Aware Organization (6)
  • Unit 06: Physical and Environmental Security (6)
  • Unit 08: Case Study 3 – A Hospital Catches the "Millennium Bug" (2)
  • Unit 09: Business Continuity and Disaster Recovery (6)
  • Unit 10: Network Security (6)
  • Unit 11: Cryptography, Public Key Encryption and Digital Signature (6)
  • Unit 12: Identity Management and Access Control (6)
  • Unit 13: Computer Application Security (6)
  • Welcome (1)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in