• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Protection of Information Assets

Temple University

Protection of Information Assets

MIS 5206.951 ■ Summer 2024 ■ David Lanter
  • HomePage
  • Instructor
  • Syllabus with Readings (Start reading now!)
  • Team Project
  • Class Meeting – Online via Zoom

0b: Understanding an Organization's Risk Environment

Unit#0b Lecture Videos

April 29, 2024 by David Lanter

Watch the Lecture videos in order:

  1. Part 1  Business Context
  2. Part 2  Key Concepts – CIA, Threats-Adversarial
  3. Part 3  Key Concepts – Threats-Accidental, Structural, Environmental
  4. Part 4  Key Concepts – Vulnerabilities and Risk
  5. Part 5  Key Concepts – Risk Assessment, Quantitative Risk Assessment
  6. Part 6  Key Concepts – Risk Management, Mitigation Controls; ISACA RiskIT Framework
  7. Part 7 – Critical Infrastructure and Risk
  8. Part 8 – Risk Management Standards and Frameworks
  9. Part 9 – Risk Management Frameworks (continued), Next Time…

Filed Under: 0b: Understanding an Organization's Risk Environment Tagged With:

Question 1

April 29, 2024 by David Lanter 33 Comments

Do ITACS students represent information security vulnerabilities to the school, each other, or both?
Explain the nature of the vulnerabilities ITACS students represent in the context(s) you chose?

Filed Under: 0b: Understanding an Organization's Risk Environment Tagged With:

Question 2

April 29, 2024 by David Lanter 30 Comments

Is information security a technical problem, a business problem that the entire organization must frame and solve, or both?  Explain the nature of the problem in the context(s) you chose.

Filed Under: 0b: Understanding an Organization's Risk Environment Tagged With:

Question 3

April 29, 2024 by David Lanter 32 Comments

Provide an example of a measurement used in quantitative information security risk analysis.
What challenges are involved in calculating such a measurement?

Filed Under: 0b: Understanding an Organization's Risk Environment Tagged With:

Primary Sidebar

Questions about the Readings and Case Studies

  • 0a: Course Introduction & Webinar (1)
  • 0b: Understanding an Organization's Risk Environment (4)
  • 1a: Case Study 1 Snowfall and a stolen laptop (4)
  • 1b: Data Classification Process and Models (4)
  • 2a: Risk Evaluation (4)
  • 2b: Case Study 2 Autopsy of a Data Breach: The Target Case (4)
  • 3a: Creating a Security Aware Organization (4)
  • 3b: Physical and Environmental Security (3)
  • 4b Case Study 3 A Hospital catches the Millennium Bug (4)
  • 5a: Business Continuity and Disaster Recovery (4)
  • 5b: Team Project Instructions (1)
  • 6a: Network Security (4)
  • 6b – Cryptography Public Key Encryption and Digital Signatures (4)
  • 7a: Identity Management and Access Control (4)
  • 7b: Computer Application Development Security (4)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in