Security Categorization Workbook
Lecture presentation
Protection of Information Assets
Temple University
by David Lanter
by David Lanter
Lecture presentation
by David Lanter
Lecture presentation
What steps did the cybercriminals follow in committing this theft?
What factors allowed this theft to take place?
What are the consequences of the breach for the stakeholders?
by David Lanter
Watch the Lecture videos in order:
by David Lanter
Please first review the syllabus which is available in the menu (above) and then watch the video using the link below:
In this course you will learn key concepts and components necessary for protecting the confidentiality, integrity and availability (CIA) of information assets. You will gain an understanding of the importance and key techniques for managing the security of information assets including logical, physical, and environmental security along with disaster recovery and business continuity.
The first half of the course, leading up to the mid-term exam, will focus on Information Security Risk Identification and Management. The second half of the class will cover the details of security threats and the mitigation strategies that are used to manage risk.
Course Objectives
What is a disaster recovery plan? Why is it needed?
What is a business impact analysis? Why is it needed?