• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Protection of Information Assets

Temple University

Protection of Information Assets

MIS 5206.701 ■ Fall 2024 ■ David Lanter
  • HomePage
  • Instructor
  • Syllabus
  • Schedule
    • First Half of the Semester
      • Unit #1: Understanding an Organization’s Risk Environment
      • Unit #2: Case Study 1 – Snowfall and stolen laptop
      • Unit #2: Data Classification Process and Models
      • Unit #3: Risk Evaluation
      • Unit #4 Case #2: Autopsy of a Data Breach: The Target Case
      • Unit #5: Creating a Security Aware Organization
      • Unit #6: Physical and Environmental Security
    • Second Half of the Semester
      • Unit #8 Case Study 3 – A Hospital Catches the “Millennium Bug”
      • Unit #9: Business Continuity and Disaster Recovery Planning
      • Unit #10: Network Security
      • Unit #11: Cryptography, Public Key Encryption and Digital Signatures
      • Unit #12: Identity Management and Access Control
      • Unit #13: Computer Application Security
  • Deliverables
    • Weekly Deliverables
      • “In the News” Articles
      • Answers to Reading Discussion Questions
      • Comments on Reading Discussion Question and Other Students’ Answers
    • Case Studies
    • Team Project
  • Zoom link

Team Project

Context

  • You and your team have volunteered to participate in a free community information security clinic (“ITACS Clinic”) and provide support to an under-served small local business
  • In a prior meeting your team was introduced to a number of small businesses and community support organizations. At that meeting you did a great job introducing yourself and the service you are offering through the clinic
  • One organization that attended the meeting has taken you up on your offer and signed up to meet with you and receive intensive help from your team. Your client knows who you are and there is no need to reintroduce your team during your Team Presentation
  • You will conduct your next meeting with your client during your Team Presentation

Assignment

  • Your assignment is to deliver a 15-minute presentation to your client (Prof. Lanter will act as the owner/manager of the business.) During your 15–minute presentation your team is responsible for explaining the following:

1. Information System Security

  • Introduce them to the information security objectives we learned in this MIS 5206 class
  • Explain how the objectives and impacts of breaches are relevant to a small business like theirs

2. Cyber Security Process

  • Describe the process you will guide them through to help them decide how to secure their information and computer systems
  • Explain where they are in the process and how the homework assignment you are giving them fits in the process

3. Homework Assignment

  • Explain how your client should get started, what they need to work on, and what they need to bring with them to your next meeting
  • Provide motivation – Explain why they need to do their homework and what is in it for them?
  • Provide details of their homework assignment using a worked-out example or template – So they know how to do their homework

Deliverables

Your team will deliver your presentation during either Unit #13 or #14.

By end of Unit #14 each student should submit to Canvas in PDF format the following:

  1. Team project PowerPoint slide presentation. Be sure to identify: your client, your Team, and all members of your team in deliverables for both 1 &2
  2. Homework materials your team prepared for your client. Worked out example &/or template for your client to use in doing their homework
  3. Your 360-degree review, answering the questions: 1) What you contributed to your team’s project? 2) What each other member of the team contributed to the project?

Primary Sidebar

Weekly Discussions

  • Unit 01: Understanding an Organization's Risk Environment (5)
  • Unit 02: Case Study 1 – Snowfall and a stolen laptop (1)
  • Unit 02: Data Classification Process and Models (6)
  • Unit 03: Risk Evaluation (6)
  • Unit 04: Case Study 2 – Autopsy of a Data Breach – The Target Case (4)
  • Unit 05: Creating a Security Aware Organization (6)
  • Unit 06: Physical and Environmental Security (6)
  • Unit 08: Case Study 3 – A Hospital Catches the "Millennium Bug" (2)
  • Unit 09: Business Continuity and Disaster Recovery (6)
  • Unit 10: Network Security (6)
  • Unit 11: Cryptography, Public Key Encryption and Digital Signature (6)
  • Unit 12: Identity Management and Access Control (6)
  • Unit 13: Computer Application Security (6)
  • Welcome (1)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in