• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Protection of Information Assets

Temple University

Protection of Information Assets

MIS 5206.951 ■ Summer 2026 ■ Kelly McKain-D'Andria
  • Welcome
  • Instructor
  • Syllabus with Readings (Start reading now!)
  • Team Project Preparation

Kelly McKain-D'Andria

Wrap Up

June 21, 2025 by Kelly McKain-D'Andria

COBIT 5 Enabling Processes 

NIST SP 800-60v1r1 – Guide for mapping information types to security categories

NIST SP 800-60v2r1 – Appendix

Lecture presentation

Quiz and solutions

 

Filed Under: 1c: Risk Evaluation Tagged With:

Wrap Up

June 21, 2025 by Kelly McKain-D'Andria

Lecture presentation

Quiz and solutions

Filed Under: 1b: Data Classification Process and Models Tagged With:

Protection of Information Assets

May 15, 2025 by Kelly McKain-D'Andria

Please first review the syllabus which is available in the menu (above) and then watch the video using the link below:

  • Introduction to MIS5206 Video [Please note that the link to purchase the Harvard Business Publishing course pack containing Case Study readings is found in the Syllabus]

In this course you will learn key concepts and components necessary for protecting the confidentiality, integrity and availability (CIA) of information assets. You will gain an understanding of the importance and key techniques for managing the security of information assets including logical, physical, and environmental security along with disaster recovery and business continuity.

The first half of the course, leading up to the mid-term exam, will focus on Information Security Risk Identification and Management. The second half of the class will cover the details of security threats and the mitigation strategies that are used to manage risk.

Course Objectives

  1. Gain an overview of the nature of information security vulnerabilities and threats
  2. Learn how information security risks are identified, classified and prioritized
  3. Develop an understanding of how information security risks are managed, mitigated and controlled
  4. Gain experience working as part of team, developing and delivering a professional presentation
  5. Gain insight into certification exams and improve your test taking skills

 

Filed Under: 0a: Course Introduction & Webinar Tagged With:

Question 1

April 29, 2025 by Kelly McKain-D'Andria 30 Comments

What steps did the cybercriminals follow in committing this theft?

Filed Under: 2a: Case Study 2 Autopsy of a Data Breach: The Target Case Tagged With:

Question 2

April 29, 2025 by Kelly McKain-D'Andria 30 Comments

What factors allowed this theft to take place?

Filed Under: 2a: Case Study 2 Autopsy of a Data Breach: The Target Case Tagged With:

Question 3

April 29, 2025 by Kelly McKain-D'Andria 28 Comments

What are the consequences of the breach for the stakeholders?

Filed Under: 2a: Case Study 2 Autopsy of a Data Breach: The Target Case Tagged With:

Unit#0b Lecture Videos

April 29, 2025 by Kelly McKain-D'Andria

Watch the Lecture videos in order:

  1. Part 1  Business Context
  2. Part 2  Key Concepts – CIA, Threats-Adversarial
  3. Part 3  Key Concepts – Threats-Accidental, Structural, Environmental
  4. Part 4  Key Concepts – Vulnerabilities and Risk
  5. Part 5  Key Concepts – Risk Assessment, Quantitative Risk Assessment
  6. Part 6  Key Concepts – Risk Management, Mitigation Controls; ISACA RiskIT Framework
  7. Part 7 – Critical Infrastructure and Risk
  8. Part 8 – Risk Management Standards and Frameworks
  9. Part 9 – Risk Management Frameworks (continued), Next Time…

Lecture slide deck

Filed Under: 0b: Understanding an Organization's Risk Environment Tagged With:

Question 1

April 29, 2025 by Kelly McKain-D'Andria 28 Comments

What is a disaster recovery plan?  Why is it needed?

Filed Under: 3c: Business Continuity and Disaster Recovery Tagged With:

Question 2

April 29, 2025 by Kelly McKain-D'Andria 27 Comments

What is a business impact analysis?  Why is it needed?

Filed Under: 3c: Business Continuity and Disaster Recovery Tagged With:

Question 3

April 29, 2025 by Kelly McKain-D'Andria 27 Comments

What is the relationship between a business impact analysis and a disaster recovery plan?

Filed Under: 3c: Business Continuity and Disaster Recovery Tagged With:

  • « Go to Previous Page
  • Page 1
  • Page 2
  • Page 3
  • Page 4
  • Interim pages omitted …
  • Page 6
  • Go to Next Page »

Primary Sidebar

Questions about the Readings and Case Studies

  • 0a: Course Introduction & Webinar (1)
  • 0b: Understanding an Organization's Risk Environment (4)
  • 1a: Case Study 1 Snowfall and a stolen laptop (3)
  • 1b: Data Classification Process and Models (4)
  • 1c: Risk Evaluation (4)
  • 2a: Case Study 2 Autopsy of a Data Breach: The Target Case (4)
  • 2b: Creating a Security Aware Organization (4)
  • 2c: Physical and Environmental Security (3)
  • 3b Case Study 3 A Hospital catches the Millennium Bug (4)
  • 3c: Business Continuity and Disaster Recovery (4)
  • 4a: Team Project Instructions (1)
  • 4b: Network Security (4)
  • 4c: Cryptography Public Key Encryption and Digital Signatures (4)
  • 5a: Identity Management and Access Control (4)
  • 5b: Computer Application Security (4)

Copyright © 2026 · Course News Pro on Genesis Framework · WordPress · Log in