• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Protection of Information Assets

Temple University

Protection of Information Assets

MIS 5206.951 ■ Summer 2026 ■ Kelly McKain-D'Andria
  • Welcome
  • Instructor
  • Syllabus with Readings (Start reading now!)
  • Team Project Preparation

Kelly McKain-D'Andria

Wrap Up

June 21, 2025 by Kelly McKain-D'Andria

Team Project Instructions

Filed Under: 4a: Team Project Instructions Tagged With:

Wrap Up

June 21, 2025 by Kelly McKain-D'Andria

Lecture presentation

Quiz and solutions

Filed Under: 2c: Physical and Environmental Security Tagged With:

Wrap Up

June 21, 2025 by Kelly McKain-D'Andria

Lecture presentation

Quiz and solutions

Filed Under: 4b: Network Security Tagged With:

Wrap Up

June 21, 2025 by Kelly McKain-D'Andria

Lecture presentation

Quiz and solutions

Filed Under: 4c: Cryptography Public Key Encryption and Digital Signatures Tagged With:

Wrap Up

June 21, 2025 by Kelly McKain-D'Andria

Case Study 3 Team Assignment

Filed Under: 3b Case Study 3 A Hospital catches the Millennium Bug Tagged With:

Wrap Up

June 21, 2025 by Kelly McKain-D'Andria

Lecture presentation

Quiz and solutions

 

Filed Under: 3c: Business Continuity and Disaster Recovery Tagged With:

Wrap Up

June 21, 2025 by Kelly McKain-D'Andria

Target Case Study – Team Assignment

Filed Under: 2a: Case Study 2 Autopsy of a Data Breach: The Target Case Tagged With:

Wrap Up

June 21, 2025 by Kelly McKain-D'Andria

Lecture presentation

Quiz and solutions

Filed Under: 5a: Identity Management and Access Control Tagged With:

Wrap Up

June 21, 2025 by Kelly McKain-D'Andria

Lecture Presentation

NIST SP 800-53r5

NIST SP 800-53Ar5

NIST SP 800-53B

Quiz and solutions

 

Filed Under: 2b: Creating a Security Aware Organization Tagged With:

Wrap Up

June 21, 2025 by Kelly McKain-D'Andria

Lecture presentation

Quiz and solutions

Filed Under: 5b: Computer Application Security Tagged With:

  • Page 1
  • Page 2
  • Page 3
  • Interim pages omitted …
  • Page 6
  • Go to Next Page »

Primary Sidebar

Questions about the Readings and Case Studies

  • 0a: Course Introduction & Webinar (1)
  • 0b: Understanding an Organization's Risk Environment (4)
  • 1a: Case Study 1 Snowfall and a stolen laptop (3)
  • 1b: Data Classification Process and Models (4)
  • 1c: Risk Evaluation (4)
  • 2a: Case Study 2 Autopsy of a Data Breach: The Target Case (4)
  • 2b: Creating a Security Aware Organization (4)
  • 2c: Physical and Environmental Security (3)
  • 3b Case Study 3 A Hospital catches the Millennium Bug (4)
  • 3c: Business Continuity and Disaster Recovery (4)
  • 4a: Team Project Instructions (1)
  • 4b: Network Security (4)
  • 4c: Cryptography Public Key Encryption and Digital Signatures (4)
  • 5a: Identity Management and Access Control (4)
  • 5b: Computer Application Security (4)

Copyright © 2026 · Course News Pro on Genesis Framework · WordPress · Log in