• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Protection of Information Assets

Temple University

Protection of Information Assets

MIS 5206.951 ■ Summer 2024 ■ David Lanter
  • HomePage
  • Instructor
  • Syllabus with Readings (Start reading now!)
  • Team Project
  • Class Meeting – Online via Zoom

1a: Case Study 1 Snowfall and a stolen laptop

Wrap Up

May 31, 2024 by David Lanter

Lecture presentation

Filed Under: 1a: Case Study 1 Snowfall and a stolen laptop Tagged With:

Question 1

April 29, 2024 by David Lanter 32 Comments

Consider Ash Rao’s role as Dean of the Saunders College of Business. How important is his laptop to him? What information might he have on that machine?

 

Filed Under: 1a: Case Study 1 Snowfall and a stolen laptop Tagged With:

Question 2

April 29, 2024 by David Lanter 30 Comments

Evaluate the steps that Dave Ballard and Nick Francesco took in response to Dean Rao’s email informing them that his laptop had been stolen.

Filed Under: 1a: Case Study 1 Snowfall and a stolen laptop Tagged With:

Question 3

April 29, 2024 by David Lanter 31 Comments

Assume you are tasked with designing a new policy that highlights information security best practices related specifically to mobile devices at RIT, including laptops, smartphones, and tablets. The new policy should supplement RIT’s Information Security Policy and Acceptable Use Policy (case Exhibits 4 and 5). What practices would you recommend? How could you make staff aware of the policy and encourage their compliance?

Filed Under: 1a: Case Study 1 Snowfall and a stolen laptop Tagged With:

Primary Sidebar

Questions about the Readings and Case Studies

  • 0a: Course Introduction & Webinar (1)
  • 0b: Understanding an Organization's Risk Environment (4)
  • 1a: Case Study 1 Snowfall and a stolen laptop (4)
  • 1b: Data Classification Process and Models (4)
  • 2a: Risk Evaluation (4)
  • 2b: Case Study 2 Autopsy of a Data Breach: The Target Case (4)
  • 3a: Creating a Security Aware Organization (4)
  • 3b: Physical and Environmental Security (3)
  • 4b Case Study 3 A Hospital catches the Millennium Bug (4)
  • 5a: Business Continuity and Disaster Recovery (4)
  • 5b: Team Project Instructions (1)
  • 6a: Network Security (4)
  • 6b – Cryptography Public Key Encryption and Digital Signatures (4)
  • 7a: Identity Management and Access Control (4)
  • 7b: Computer Application Development Security (4)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in