• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Protection of Information Assets

Temple University

Protection of Information Assets

MIS 5206.951 ■ Summer 2024 ■ David Lanter
  • HomePage
  • Instructor
  • Syllabus with Readings (Start reading now!)
  • Team Project
  • Class Meeting – Online via Zoom

David Lanter

Question 3

April 29, 2024 by David Lanter 30 Comments

How would you go about creating an information risk profile for a small start-up business? Describe what the risk profile for the business would contain?  How should the business use the risk profile?

Filed Under: 2a: Risk Evaluation Tagged With:

Question 3

April 29, 2024 by David Lanter 30 Comments

Which two information security objectives could be put at risk if the mitigations (i.e. “safeguards”) recommended by the Guidelines for Providing Appropriate Access to Geospatial Data in Response to Security Concerns are applied?  Explain how each of the security objectives is put at risk by the safeguards.

Filed Under: 1b: Data Classification Process and Models Tagged With:

Question 3

April 29, 2024 by David Lanter 31 Comments

What is the one interesting point you learned from the readings this week?  Why is it interesting?

Filed Under: 7a: Identity Management and Access Control Tagged With:

Wrap Up

June 5, 2021 by David Lanter

Case Study Team Assignment

Case Study Analysis presentation

Tagged With:

Question 3

April 17, 2020 by David Lanter Leave a Comment

Question 3: What should Bob Sadlemire tell the Board of Trustees at the June meeting?

Tagged With:

Week 9 – All Questions

October 21, 2017 by David Lanter

Case Study: A Hospital Catches the “Millennium Bug”

Introduction: To prevent disaster and assure business continuity, Year 2000 (also known as “Millennium Bug” or “Y2K Bug” or “Y2K”) compliance projects entailed the following technical steps which applied to: all categories of software (operating systems, transaction processing and decision support applications, vendor packages, custom and user-developed software applications, etc.), computing hardware (desktop, midrange and mainframe systems), and programmable devices (such as elevator controls – which contained date-sensitive microprocessors):

  • Inventory:         Identify hardware and software that might five rise to “Year 2000” (Y2K) problems
  • Analysis:           Examine code for date fields, determining which ones needed to be fixed
  • Remediation:   Alter the code for Y2K compliance (aka “renovation,” “conversion”)
  • Testing:             Ensure the altered code produces correct results
  • Migration:        Put the new code into production

Question 1: Based on the facts presented in the case, how far had Fetcher-Allen progressed in these steps by the end of June, 1998?  How likely is it that Fletcher-Allen would have achieved full-year 2000 compliance by December 31, 1999?  (Explain your reasoning, supported by specific evidence from the case and assigned readings.)

Question 2: At the end of the case, Sadlemire observes, “This project sometimes plays second fiddle to other projects that I believe are less critical.”  What “other projects” do you think he is referring to here? What advice would you give Sadlemire to help him address this issue of conflicting priorities?

Question 3: What should Bob Sadlemire tell the Board of Trustees at the June meeting?

Tagged With:

Class 2 – Wrap up

September 9, 2017 by David Lanter

Presentation: Presentation

Quiz w/solutions” Quiz w/solutions

Tagged With:

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 4
  • Page 5
  • Page 6

Primary Sidebar

Questions about the Readings and Case Studies

  • 0a: Course Introduction & Webinar (1)
  • 0b: Understanding an Organization's Risk Environment (4)
  • 1a: Case Study 1 Snowfall and a stolen laptop (4)
  • 1b: Data Classification Process and Models (4)
  • 2a: Risk Evaluation (4)
  • 2b: Case Study 2 Autopsy of a Data Breach: The Target Case (4)
  • 3a: Creating a Security Aware Organization (4)
  • 3b: Physical and Environmental Security (3)
  • 4b Case Study 3 A Hospital catches the Millennium Bug (4)
  • 5a: Business Continuity and Disaster Recovery (4)
  • 5b: Team Project Instructions (1)
  • 6a: Network Security (4)
  • 6b – Cryptography Public Key Encryption and Digital Signatures (4)
  • 7a: Identity Management and Access Control (4)
  • 7b: Computer Application Development Security (4)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in