• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Protection of Information Assets

Temple University

Protection of Information Assets

MIS 5206.951 ■ Summer 2026 ■ Kelly McKain-D'Andria
  • Welcome
  • Instructor
  • Syllabus with Readings (Start reading now!)
  • Team Project Preparation

Question 3

April 29, 2025 by Kelly McKain-D'Andria 28 Comments

What is the one interesting point you learned from the readings this week?  Why is it interesting?

Filed Under: 5a: Identity Management and Access Control Tagged With:

Reader Interactions

Comments

  1. Changyang Sui says

    June 11, 2025 at 8:26 am

    This study tested the impact of several document features on user authenticity perceptions for both email messages and Web pages. The influence of these features was context dependent in email messages. We were surprised that this context was shaped more by a message’s narrative strength, rather than its underlying authenticity. Third-party endorsements and glossy graphics proved to be effective authenticity stimulators when message content was short and unsurprising. The same document features failed to influence authenticity judgments in a significant way when applied to more involving messages. Most surprising was the huge increase in trust caused by a small-print footer in a message that already exhibited strong personalization with its greeting and presentation of a four-digit account number suffix.

    Log in to Reply
  2. Xinran Wu says

    June 16, 2025 at 12:00 pm

    I found an interesting thing that the privacy agreement is actually a kind of protection for the user’s information. It reminds me that in daily life, when I log in an APP to buy coffee, log in the official website of a bank to make payment, or submit a resume on the official website of a company, I need to click the button of “I have agreed to the privacy agreement”. What third parties will my information be provided to? I inadvertently overlooked the regulatory protection of personal privacy, I will read the privacy agreement carefully in the future.
    But in some specific cases, I have to use a website, but I don’t want to agree to the privacy policy of the website, how to proceed?

    Log in to Reply
  3. Yingyu Wang says

    June 17, 2025 at 5:41 am

    Intersts me the most is the internet security and multiple attack ways, learn how how to defend threate and how these attack happens. This part always shows in movies or TV serieses, and some attack also close to our life, such as phising and DDoS(which contnually happens on a game service before). So when reading this part I really feel it interesting.

    Log in to Reply
  4. Jingni Li says

    June 18, 2025 at 2:10 am

    The most interesting aspect from these questions is the relationship between identity management and access management, particularly in terms of “getting an ID card” and “swiping access cards” in daily life.
    For example, as mentioned earlier, identity management is like issuing ID cards to everyone, solving the problem of ‘who are you’; Access management is like an access control system, determining which door you can enter. This analogy of mapping abstract IT concepts to daily life scenarios suddenly makes people feel that the technical logic is actually very similar to common sense – just like at home, it is impossible to only give people door cards without specifying which doors can be opened. When managing account permissions in enterprises, identity must be confirmed first, and permissions must be given according to needs, otherwise it will be chaotic.
    What’s interesting is that the underlying logic of what was originally thought to be a complex network security concept is exactly the same as what we encounter every day (such as clocking in at work, access to elevators by floor). This sense of correlation between “technology comes from life” makes seemingly sophisticated security knowledge particularly grounded, like suddenly realizing that “Oh! So what programmers are thinking is the same as the access control of community property management”, instantly bringing the distance between professional knowledge and it.

    Log in to Reply
  5. Siyu Li says

    June 18, 2025 at 4:59 am

    The one interesting point you learned from the readings this week is online identity and user management services. It feels as if the login verification procedures in daily life are materializing before our eyes. By understanding their origin, evolution, and development step by step, we come to realize the password recognition, fingerprint recognition, facial recognition, dynamic verification codes, and other methods we commonly encounter today. Behind these simple acts lie a complex and meticulous logic designed to protect our information and cyber security.

    Log in to Reply
  6. Ruizhen Zhang says

    June 18, 2025 at 4:59 am

    One interesting point from the readings this week is the fact that the Target data breach was facilitated through a phishing email sent to one of its vendors, Fazio Mechanical Services. This is interesting because it highlights how even the most well-protected organizations can be vulnerable to cyber attacks due to the actions of a third-party vendor. It was surprising that Target invested so many resources in cybersecurity, but the vulnerability was in one vendor, and it made me realize that cybersecurity is actually a systemic problem, which affects the whole body, which is quite similar to our lives, and maybe a small negligence can affect the trust of the whole family or friends.

    Log in to Reply
  7. Yufei Zhu says

    June 18, 2025 at 10:01 am

    I think the content about identity management in this week’s reading is very interesting. I think identity management is a very amazing and useful design. As the scale of an enterprise expands day by day, the number of employees will also increase. It would be very troublesome and cumbersome if the enterprise had to allocate resources for every new employee who joined it. If this employee is to undergo personnel transfer in the future, his authority still needs to be reallocated. Identity management has solved this problem very effectively. Use information technology to ensure the validity of identities and continuously incorporate updated technologies to facilitate the identity authentication process, guaranteeing the privacy, availability and mobility of identities.

    Log in to Reply
  8. Jialin Fan says

    June 18, 2025 at 10:53 am

    I’m interested in chapter 52. This chapter discusses the fundamental aspects of online privacy, tracing its historical roots and the ongoing challenge of establishing universally accepted definitions. Privacy in the digital age is influenced by various factors, including economic interests, human cognitive limitations, and the complexity of balancing individual control over personal data with business and societal benefits. The chapter highlights the data broker industry, detailing how it collects and trades personal data, often without individuals’ awareness. It explores the concept of informed consent as a cornerstone of privacy policies, noting its practical limitations and the challenges in achieving meaningful control over personal data.

    Log in to Reply
  9. Zuqi Zhang says

    June 19, 2025 at 5:15 am

    The coolest part I found is how identity management and access management connect to everyday stuff.
    In businesses, it’s the same deal. First, you need to know who someone is (identity management), and then you give them the right permissions (access management) so they can do their job but not mess with stuff they shouldn’t.
    It’s really cool how this shows that even the most complex tech stuff is based on common sense and things we deal with every day. It makes it way easier to understand and less intimidating. It’s like seeing the connection between what programmers do and what the building security does—it’s all about keeping things safe and organized.

    Log in to Reply
  10. Wenhao Liu says

    June 19, 2025 at 5:29 am

    One interesting point from the readings is how social login has become a dominant identity management solution despite privacy concerns. Users prioritize convenience, quickly logging into new services with existing social media accounts, over potential long-term privacy risks. This shows that even though technologies like OpenID exist to promote user-centric identity management, real-world adoption often gravitates toward solutions that are easiest to use, even if they aren’t perfect in terms of privacy. It highlights the tension between technical security ideals and user behavior, and how businesses need to adapt to user preferences while still trying to maintain some level of security.

    Log in to Reply
  11. Meiyan Liu says

    June 19, 2025 at 8:10 am

    Research has found that details such as legal disclaimers and hyperlinks in email footers, even when designed minimally, enhance users’ trust in the authenticity of emails more than ornate graphics, which runs counter to design intuition. Its significance lies in: revealing that users rely more on details like legal statements to judge legitimacy, providing insights for anti-phishing (attackers may forget footers, while legitimate services can use this to strengthen trust), and also indicating that security design needs to combine users’ cognitive shortcuts to build trust through functional details.

    Log in to Reply
  12. Jianwei Huang says

    June 19, 2025 at 10:28 am

    This week, I found it fascinating how the growth of microprocessor speed directly impacts encryption key lengths. The idea that each year’s doubling of processing power means we need to add a bit to symmetric keys to stay secure is like a constant arms race between tech and security. It’s interesting because it shows how something as abstract as key length is tied to real-world hardware progress, and why security can’t just be a one-time fix—it’s a moving target that needs constant adjustment.

    Log in to Reply
  13. Yiying Chen says

    June 19, 2025 at 12:16 pm

    I am interesting in the encryption and discryption which are also I am not familiar with. I am having an intership currently which is an information system cyber security auditing. I learned those concepts and methodologies in the book firstly and have a strong sense of familarity, except for encryption. Related to that, I only had the feeling of getting annoyed from the conplexity of daily keys I use in life, however, that’s very sjmple in this subjects. For a business, there are much more factors to be considered when deciding how long and complex the key should be, considering the costs of managing and controlling.

    Log in to Reply
  14. Shouxi Mou says

    June 20, 2025 at 1:06 am

    1. Key Insight​​
    The ​​Target breach​​ (Document 2) revealed that even ​​advanced security tools​​ (like FireEye) fail if humans ignore alerts.

    ​​2. Why Interesting?​​
    ​​Real-World Impact​​: A $1.6M system was useless because staff dismissed warnings—showing ​​culture > tech​​.
    ​​Relatable to All Orgs​​: Similar to RIT’s laptop case (Document 1), where manual backups failed.
    ​​3. Surprising Detail​​
    Hackers ​​stole data during business hours​​ (10am–6pm) to blend in—a clever evasion tactic.

    Log in to Reply
  15. Jiwei Yang says

    June 20, 2025 at 1:22 am

    The most interesting point in this week’s reading is “Why don’t actual systems use 1000-bit symmetric keys?”. Theoretically, the longer the key, the more secure it is. However, in reality, a 1000-bit key would cause the real-time applications such as medical data access to crash due to excessive computational costs. Moreover, the existing encryption protocols and hardware have not been optimized for such keys, and forcing their use would compromise compatibility. More importantly, a 256-bit key is already sufficient to resist future attacks, and most data leaks result from configuration vulnerabilities. The interesting aspect of this point lies in breaking the perception that “security is about pursuing the ultimate technical parameters”, and revealing that technical decisions need to be balanced among multiple factors such as performance, cost, and compatibility, just like in architectural design, one cannot only focus on material strength but also needs to consider practical needs.

    Log in to Reply
  16. Wenhao GUO says

    June 20, 2025 at 1:40 am

    I find the concept of identity management discussed in this week’s readings particularly intriguing. It’s a remarkably ingenious and practical design, especially as enterprises continue to grow in scale. As the number of employees increases, manually allocating resources for each new hire would be incredibly tedious and inefficient. Similarly, reassigning permissions when an employee transfers to a different department would pose significant administrative challenges.
    Identity management effectively addresses these issues by leveraging information technology to validate identities. By integrating evolving technologies, it streamlines the identity authentication process, ensuring the privacy, accessibility, and flexibility of identities. This not only simplifies the onboarding and role transition processes but also enhances overall security by automating permission adjustments and reducing the risk of human error in resource allocation.

    Log in to Reply
  17. Yan Liu says

    June 20, 2025 at 2:31 am

    The reading’s focus on identity management highlights its strategic value for enterprises. As organizational scales grow, manual permission allocation for each new hire or transfer becomes inefficient. Identity management addresses this by: – Automating identity validation through IT systems, – Integrating evolving technologies to streamline authentication, – Ensuring privacy, availability, and mobility of identities across dynamic workflows.
    This design mitigates administrative burdens while enhancing security, proving indispensable for scalable enterprise operations.

    Log in to Reply
  18. Xintong Zhang says

    June 20, 2025 at 2:50 am

    In this week’s reading, an interesting point I learned is that the persuasive power of the narrative in phishing emails significantly affects users’ ability to recognize fraud, and this influence often outweighs the effect of design elements. For example, when an e-commerce platform merged with a logistics company, a batch of white-background black-text phishing emails appeared. They used the notification of system upgrade requiring account verification, claiming that the merger required updating payment information. Although these emails had no official logos or encryption marks, because the narrative was in line with the company’s dynamics, many users ignored the misspelling of the domain name and led to information leakage. This confirms the research conclusion that the phishing narrative that fits the context is more deceptive than elaborate design, and it also indicates that anti-phishing strategies cannot rely solely on visual warnings.

    Log in to Reply
  19. Yiwen Lou says

    June 20, 2025 at 5:26 am

    I found this week’s reading on identity management really fascinating—it’s such an ingenious and practical design! As enterprises grow, the number of employees keeps increasing, and it used to be a huge headache to allocate resources for every new hire. Worse yet, if an employee transferred roles, reassigning their permissions was a total hassle. Identity management has totally solved this problem. By leveraging IT to validate identities and constantly integrating updated tech, it streamlines the authentication process while protecting identity privacy, ensuring availability, and enabling mobility.
    It’s amazing how this system scales—instead of manual resource juggling, tech automates the whole process. Whether onboarding a new staffer or shifting someone to a different department, the framework adapts seamlessly. I especially appreciate how it balances security with usability, making sure identities stay secure without bogging down operations. Definitely a game-changer for modern organizations.

    Log in to Reply
  20. Huiling Huang says

    June 20, 2025 at 5:56 am

    An interesting perspective I learned this week about identity management (IDM) and access control (AC) is that they form a symbiotic relationship: IDM answers “who you are” as the prerequisite for AC, while AC defines “what you can do” as the extension of IDM. What makes this intriguing is how it clarifies their interdependence—both are indispensable for enterprise security. Focusing solely on IDM leaves gaps in permission control, while prioritizing AC without accurate identity authentication renders controls meaningless. This view reveals that their synergy, not isolation, ensures robust security frameworks.

    Log in to Reply
  21. Jiaxuan Ma says

    June 20, 2025 at 7:28 am

    I am impressive on the method “The 5 Whys” brought by Toyota for analyzing the root causes of security problems in HBR Reading 1: “The Myth of Security Computing”.
    Whenever a security problem is found, the organization should conduct a detailed analysis to get to the bottom of production and quality problems. The investigation is such logical:
    “•Why didn’t the firewall stop the unauthorized entry? Because the attacker had an authorized
    password.
    •Why did the attacker have an authorized password? Because an employee revealed his
    password to someone posing as another company employee.
    •Why did the employee reveal his password? Because he didn’t realize the danger in doing that.
    •Why didn’t the employee realize the danger? Because he had not seen a security bulletin that
    addressed the subject.
    •Why hadn’t the employee seen the security bulletin? Because there was a problem in the
    distribution process.”
    And the root cause analyzed is also unexpected yet reasonable: “Toyota has found that the answers to the final questions almost always have to do with inadequacies in the design of a process, not with specific people, machines, or technologies. Using tools like this to investigate digital security incidents drives continuous operational improvements that ultimately lower risk.”
    I am very interested in this step-by-step logical analysis process.

    Log in to Reply
  22. Xiaojin Liu says

    June 20, 2025 at 7:32 am

    What impressed me most this week in my reading was the user-controlled identity management model. The most brilliant aspect of this model is that users only need one account to log in to all websites, eliminating the need to remember a bunch of passwords. At the same time, they can decide for themselves which information to share with whom, making it both convenient and secure. This completely changes the previous situation where websites controlled users’ data, truly returning the right to privacy to users. It is a perfect combination of technological progress and privacy protection.

    Log in to Reply
  23. Liyuan Zhou says

    June 21, 2025 at 3:36 am

    The most interesting takeaway from this week’s readings is the “two-key” mechanism in online privacy protection: identity management verifies “who you are,” while access management controls “what you can do”—missing either creates privacy loopholes. For example, when registering for an app, merely verifying your phone number (identity management) without restricting how the platform uses it (access management) is like giving a supermarket cashier your ID card and letting them leak the info freely.

    This overturns the common belief that privacy breaches are all due to hackers—turns out, chaotic permission management is a frequent culprit. It’s like a小区 (residential community) that only checks access cards but doesn’t restrict which areas cardholders can enter, allowing delivery personnel to sneak into residents’ homes. This “separation of duties” security logic reveals that privacy protection requires the same meticulous splitting of management as key control.

    Log in to Reply
  24. Rong Su says

    June 21, 2025 at 8:18 am

    The content about identity management in this week’s reading has greatly intrigued me. As enterprises expand in scale and employee numbers continue to grow, manually allocating resources for each new staff member would be extremely tedious, and reconfiguring permissions during job transfers would consume significant effort. Identity management efficiently addresses this pain point through information technology: it not only ensures the validity of digital identities but also optimizes the authentication process with continuously evolving technologies. By safeguarding the privacy, availability, and mobility of identities, it enables automated and dynamic adjustment of resource allocation and permission management, significantly enhancing efficiency and security in enterprise personnel management scenarios.

    Log in to Reply
  25. Meiqi Yan says

    June 21, 2025 at 8:24 am

    After reading these interesting viewpoints, I realized that the extensive use of information systems has indeed brought many conveniences to enterprises, but it has also brought many threats. The subsequent review and improvement work after installing software is also extremely important for enterprises. This is the significance of our IT auditors – to help enterprises identify vulnerabilities.

    Log in to Reply
  26. Xinshang Pei says

    June 21, 2025 at 1:00 pm

    This week’s exploration of online identity management systems revealed the remarkable sophistication behind what we often take for granted in daily digital interactions. The seemingly simple act of logging into devices or platforms – whether through passwords, biometric scans, or two-factor authentication – actually represents the culmination of decades of iterative security advancements. Tracing the historical progression from basic credential checks to today’s multi-layered verification methods exposes an intricate ecosystem of protective measures working silently to safeguard our digital personas. These evolving authentication protocols demonstrate how cybersecurity has transformed from a technical consideration into an invisible yet essential layer of our digital existence, where convenience and protection constantly rebalance through innovations like behavioral biometrics and adaptive authentication. What appears as mundane user verification on the surface actually embodies complex cryptographic principles and threat mitigation strategies refined through generations of technological and adversarial evolution.

    Log in to Reply
  27. Gao Yujing says

    June 21, 2025 at 1:37 pm

    Most Interesting Insight from This Week’s Readings​​
    ​​Security Debt Accumulation​​: Businesses sacrificing security for agility (e.g., skipping code audits, delaying patches) may gain short-term efficiency but convert technical debt into ​​systemic vulnerabilities​​, ultimately paying higher costs (e.g., breach fines + reputational damage).

    ​​Why It’s Interesting?​​
    ​​Counterintuitive Economics​​:
    Security spending is often seen as a “cost center,” but it’s actually ​​implicit asset protection​​.
    Case: A SaaS startup saved 50K/yearbyignoringanAPIflaw,thenlost2M in a breach two years later.
    ​​Quantifiable Leverage​​:
    Early basic protections (e.g., automated scanning) reduce 80% of critical vulnerabilities (Verizon DBIR), yielding >400% ROI.
    ​​Clash with Agile Culture​​:
    DevOps emphasizes “speed,” but security debt proves: ​​Velocity without security is regression​​.

    Log in to Reply
  28. Yangyu Zhang says

    June 21, 2025 at 7:43 pm

    From this week’s readings on identity and access management (IAM), the most fascinating point I learned was:
    The Emergence of “Zero Trust” as a Philosophy (Not Just a Technology)
    While I knew Zero Trust Architecture (ZTA) was trending, I hadn’t fully grasped how profoundly it redefines both Identity Management (IdM) and Access Management (AM). Unlike traditional “trust but verify” models (e.g., firewalls + VPNs), Zero Trust operates on:”Never trust, always verify.”
    Why This Is Interesting:
    1.It Flips Traditional Security on Its Head.
    2.Forces Integration of IdM and AM.Zero Trust demands that IdM and AM work together seamlessly.
    3.Solves Modern Hybrid-Work Risks.
    4.Turns Compliance Into a Byproduct.Regulations (GDPR, HIPAA) require proving “least privilege access” and audit trails. Zero Trust bakes this into architecture.

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Questions about the Readings and Case Studies

  • 0a: Course Introduction & Webinar (1)
  • 0b: Understanding an Organization's Risk Environment (4)
  • 1a: Case Study 1 Snowfall and a stolen laptop (3)
  • 1b: Data Classification Process and Models (4)
  • 1c: Risk Evaluation (4)
  • 2a: Case Study 2 Autopsy of a Data Breach: The Target Case (4)
  • 2b: Creating a Security Aware Organization (4)
  • 2c: Physical and Environmental Security (3)
  • 3b Case Study 3 A Hospital catches the Millennium Bug (4)
  • 3c: Business Continuity and Disaster Recovery (4)
  • 4a: Team Project Instructions (1)
  • 4b: Network Security (4)
  • 4c: Cryptography Public Key Encryption and Digital Signatures (4)
  • 5a: Identity Management and Access Control (4)
  • 5b: Computer Application Security (4)

Copyright © 2026 · Course News Pro on Genesis Framework · WordPress · Log in