{"id":2417,"date":"2023-07-23T14:44:24","date_gmt":"2023-07-23T18:44:24","guid":{"rendered":"http:\/\/community.mis.temple.edu\/mis5202online2016\/?page_id=2417"},"modified":"2024-08-18T14:49:14","modified_gmt":"2024-08-18T18:49:14","slug":"its-role-and-the-control-environment","status":"publish","type":"page","link":"https:\/\/community.mis.temple.edu\/mis5206sec701fall2025\/its-role-and-the-control-environment\/","title":{"rendered":"Unit #1: Understanding an Organization&#8217;s Risk Environment"},"content":{"rendered":"<p><strong>Due before our first class:<\/strong><\/p>\n<p><strong>Read<\/strong> the following:<\/p>\n<ul>\n<li>Vacca Chapter 1 \u201cInformation Security in the Modern Enterprise\u201d<\/li>\n<li>Vacca Chapter 2 &#8220;Building a Secure Organization\u201d<\/li>\n<li>NIST Reading 1: <a href=\"https:\/\/community.mis.temple.edu\/mis5206sec701fall2025\/files\/2024\/08\/NIST.CSWP_.29-CybersecurityFramework-2.0.pdf\">\u201cThe NIST Cybersecurity Framework (CSF) 2.0\u201d<\/a><\/li>\n<li>ISACA &#8220;<a href=\"https:\/\/community.mis.temple.edu\/mis5206sec701fall2025\/files\/2022\/08\/Risk-IT-Framework-2nd-Edition_fmk_Eng_0620-1.pdf\">Risk IT Framework<\/a>&#8221;\u00a0 pp. 9-30<\/li>\n<\/ul>\n<p><strong>Due before Week (Unit) 2:<\/strong><\/p>\n<ul>\n<li><strong>Post your answers<\/strong>\u00a0to the weekly reading\/discussion question(s) on the class blog for Unit #2 by the due date according to the Weekly Cycle schedule in the Syllabus page 7<\/li>\n<li><strong>Post your answers\u00a0<\/strong>to the case study questions in Canvas by the due date according to the Weekly Cycle schedule in the Syllabus page 7<\/li>\n<li><strong>Post your comments<\/strong>\u00a0on your fellow students\u2019 posted answers by the due date according to the Weekly Cycle schedule in the Syllabus page 7<\/li>\n<li><strong>Post your\u00a0<em>In the News<\/em>\u00a0topic<\/strong>\u00a0by the due date according to the Weekly Cycle schedule in the Syllabus page 7<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Due before our first class: Read the following: Vacca Chapter 1 \u201cInformation Security in the Modern Enterprise\u201d Vacca Chapter 2 &#8220;Building a Secure Organization\u201d NIST Reading 1: \u201cThe NIST Cybersecurity Framework (CSF) 2.0\u201d ISACA &#8220;Risk IT Framework&#8221;\u00a0 pp. 9-30 Due before Week (Unit) 2: Post your answers\u00a0to the weekly reading\/discussion question(s) on the class blog [&hellip;]<\/p>\n","protected":false},"author":4657,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"class_list":{"0":"post-2417","1":"page","2":"type-page","3":"status-publish","5":"entry"},"_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/mis5206sec701fall2025\/wp-json\/wp\/v2\/pages\/2417","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/mis5206sec701fall2025\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/mis5206sec701fall2025\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5206sec701fall2025\/wp-json\/wp\/v2\/users\/4657"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5206sec701fall2025\/wp-json\/wp\/v2\/comments?post=2417"}],"version-history":[{"count":11,"href":"https:\/\/community.mis.temple.edu\/mis5206sec701fall2025\/wp-json\/wp\/v2\/pages\/2417\/revisions"}],"predecessor-version":[{"id":5068,"href":"https:\/\/community.mis.temple.edu\/mis5206sec701fall2025\/wp-json\/wp\/v2\/pages\/2417\/revisions\/5068"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/mis5206sec701fall2025\/wp-json\/wp\/v2\/media?parent=2417"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}