• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Protection of Information Assets

Temple University

Protection of Information Assets

MIS 5206.951 ■ Summer 2026 ■ Kelly McKain-D'Andria
  • Welcome
  • Instructor
  • Syllabus with Readings (Start reading now!)
  • Team Project Preparation

Kelly McKain-D'Andria

Question 1

April 29, 2025 by Kelly McKain-D'Andria 28 Comments

For an organization choosing among Chengdu Sichuan 成都市, Guangzhou Guangdong 广州, and Beijing  京 , from an environmental security perspective – where would be the best place to locate their data center?  Why is this place better and the other places worse?

Filed Under: 2c: Physical and Environmental Security Tagged With:

Question 1

April 29, 2025 by Kelly McKain-D'Andria 29 Comments

The total processing speed of microprocessors (based on clock rate and number of circuits) is doubling roughly every year.  Today a symmetric session key needs to be 100 bits long to be considered strong.  How long will a symmetric session key have to be in 30 years to be considered strong? (Hint: Consider how much longer decryption takes if the key length is increased by a single bit.) Explain.

Filed Under: 4c: Cryptography Public Key Encryption and Digital Signatures Tagged With:

Question 1

April 29, 2025 by Kelly McKain-D'Andria 28 Comments

Based on the facts presented in the case, how far had Fetcher-Allen progressed in these steps by June, 1998?  How likely is it that Fletcher-Allen would have achieved full-year 2000 compliance by December 31, 1999?  [Explain your reasoning, supported by specific evidence from the case and assigned readings.]

Filed Under: 3b Case Study 3 A Hospital catches the Millennium Bug Tagged With:

Question 1

April 29, 2025 by Kelly McKain-D'Andria 28 Comments

What is the difference between identity management and access management?

 

Filed Under: 5a: Identity Management and Access Control Tagged With:

Question 1

April 29, 2025 by Kelly McKain-D'Andria 26 Comments

What is meant by the term “acceptable information system security risk”? Who within the organization determines what is the acceptable level of information system risk? How does an organization determine what is an acceptable level of risk?

Filed Under: 1c: Risk Evaluation Tagged With:

Question 3

April 29, 2025 by Kelly McKain-D'Andria 29 Comments

Assume you are tasked with designing a new policy that highlights information security best practices related specifically to mobile devices at RIT, including laptops, smartphones, and tablets. The new policy should supplement RIT’s Information Security Policy and Acceptable Use Policy (case Exhibits 4 and 5). What practices would you recommend? How could you make staff aware of the policy and encourage their compliance?

Filed Under: 1a: Case Study 1 Snowfall and a stolen laptop Tagged With:

Question 1

April 29, 2025 by Kelly McKain-D'Andria 28 Comments

What are the 3 types of risk mitigating controls? Which is the most important?  Why is it the most important?

Filed Under: 1b: Data Classification Process and Models Tagged With:

Question 2

April 29, 2025 by Kelly McKain-D'Andria 27 Comments

What factors contribute to making an employee an information security threat actor?

Filed Under: 2b: Creating a Security Aware Organization Tagged With:

Question 3

April 29, 2025 by Kelly McKain-D'Andria 28 Comments

How can employee risks be controlled?

Filed Under: 2b: Creating a Security Aware Organization Tagged With:

Question 2

April 29, 2025 by Kelly McKain-D'Andria 29 Comments

What are secure coding practices and what risks are they intended to mitigate?

Filed Under: 5b: Computer Application Security Tagged With:

  • « Go to Previous Page
  • Page 1
  • Page 2
  • Page 3
  • Page 4
  • Page 5
  • Page 6
  • Go to Next Page »

Primary Sidebar

Questions about the Readings and Case Studies

  • 0a: Course Introduction & Webinar (1)
  • 0b: Understanding an Organization's Risk Environment (4)
  • 1a: Case Study 1 Snowfall and a stolen laptop (3)
  • 1b: Data Classification Process and Models (4)
  • 1c: Risk Evaluation (4)
  • 2a: Case Study 2 Autopsy of a Data Breach: The Target Case (4)
  • 2b: Creating a Security Aware Organization (4)
  • 2c: Physical and Environmental Security (3)
  • 3b Case Study 3 A Hospital catches the Millennium Bug (4)
  • 3c: Business Continuity and Disaster Recovery (4)
  • 4a: Team Project Instructions (1)
  • 4b: Network Security (4)
  • 4c: Cryptography Public Key Encryption and Digital Signatures (4)
  • 5a: Identity Management and Access Control (4)
  • 5b: Computer Application Security (4)

Copyright © 2026 · Course News Pro on Genesis Framework · WordPress · Log in