• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Protection of Information Assets

Temple University

Protection of Information Assets

MIS 5206.951 ■ Summer 2024 ■ David Lanter
  • HomePage
  • Instructor
  • Syllabus with Readings (Start reading now!)
  • Team Project
  • Class Meeting – Online via Zoom

6a: Network Security

Wrap Up

June 5, 2024 by David Lanter

Lecture presentation

Quiz and solutions

Filed Under: 6a: Network Security Tagged With:

Question 1

April 29, 2024 by David Lanter 33 Comments

How would you determine if an organization’s network capacity is adequate or inadequate? What impacts could be expected if a portion of an organization’s network capacity is inadequate?

Filed Under: 6a: Network Security Tagged With:

Question 2

April 29, 2024 by David Lanter 30 Comments

Suppose an organization is only able to filter and selectively block either: a) network traffic coming into its intranet from the internet (incoming) or b) network traffic going out to the internet (outbound).  With respect to each of the 3 information system security objectives (i.e. confidentiality, integrity, and availability), if you could only filter and selectively block one network traffic direction which one you would you concentrate on and why?

Filed Under: 6a: Network Security Tagged With:

Question 3

April 29, 2024 by David Lanter 30 Comments

In the contexts of being attacked by or unwittingly becoming a resource for distributed denial of service (DDoS), which is a bigger threat to an organization’s network and computer resources and why: Spam phishing or Spear phishing?

Filed Under: 6a: Network Security Tagged With:

Primary Sidebar

Questions about the Readings and Case Studies

  • 0a: Course Introduction & Webinar (1)
  • 0b: Understanding an Organization's Risk Environment (4)
  • 1a: Case Study 1 Snowfall and a stolen laptop (4)
  • 1b: Data Classification Process and Models (4)
  • 2a: Risk Evaluation (4)
  • 2b: Case Study 2 Autopsy of a Data Breach: The Target Case (4)
  • 3a: Creating a Security Aware Organization (4)
  • 3b: Physical and Environmental Security (3)
  • 4b Case Study 3 A Hospital catches the Millennium Bug (4)
  • 5a: Business Continuity and Disaster Recovery (4)
  • 5b: Team Project Instructions (1)
  • 6a: Network Security (4)
  • 6b – Cryptography Public Key Encryption and Digital Signatures (4)
  • 7a: Identity Management and Access Control (4)
  • 7b: Computer Application Development Security (4)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in