• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Protection of Information Assets

Temple University

Protection of Information Assets

MIS 5206.951 ■ Summer 2026 ■ Kelly McKain-D'Andria
  • Welcome
  • Instructor
  • Syllabus with Readings (Start reading now!)
  • Team Project Preparation

Kelly McKain-D'Andria

Question 2

April 29, 2025 by Kelly McKain-D'Andria 29 Comments

What is an information risk profile? How is it used?  Why is it critical to the success of an organization’s risk management strategies and activities?

Filed Under: 1c: Risk Evaluation Tagged With:

Question 2

April 29, 2025 by Kelly McKain-D'Andria 29 Comments

A company’s physical security team analyzed physical security threats and vulnerabilities for its systems. What types of vulnerabilities did the company focus on?

Filed Under: 2c: Physical and Environmental Security Tagged With:

Question 2

April 29, 2025 by Kelly McKain-D'Andria 28 Comments

How would you apply the security categorization standards (FIPS 199) to decide if each of the information security risk mitigations (“safeguards”) described in the Guidelines for Providing Appropriate Access to Geospatial Data in Response to Security Concerns are needed?

Filed Under: 1b: Data Classification Process and Models Tagged With:

Question 2

April 29, 2025 by Kelly McKain-D'Andria 28 Comments

Longer keys are more difficult to crack. Most symmetric keys today are 100 to 300 bits long. Why don’t systems use far longer symmetric keys—say, 1,000 bit keys?

 

Filed Under: 4c: Cryptography Public Key Encryption and Digital Signatures Tagged With:

Question 2

April 29, 2025 by Kelly McKain-D'Andria 28 Comments

Why is it important to a business to care about the difference between identity management and access management?

Filed Under: 5a: Identity Management and Access Control Tagged With:

Question 2

April 29, 2025 by Kelly McKain-D'Andria 28 Comments

At the end of the case, Sadlemire observes, “This project sometimes plays second fiddle to other projects that I believe are less critical.”  What “other projects” do you think he is referring to here? What advice would you give Sadlemire to help him address this issue of conflicting priorities?

Filed Under: 3b Case Study 3 A Hospital catches the Millennium Bug Tagged With:

Question 3

April 29, 2025 by Kelly McKain-D'Andria 26 Comments

What should Bob Sadlemire tell the Board of Trustees at the June meeting?

Filed Under: 3b Case Study 3 A Hospital catches the Millennium Bug Tagged With:

Question 3

April 29, 2025 by Kelly McKain-D'Andria 28 Comments

How are digital certificates and drivers’ licenses similar, and how are they different?

Filed Under: 4c: Cryptography Public Key Encryption and Digital Signatures Tagged With:

Question 3

April 29, 2025 by Kelly McKain-D'Andria 29 Comments

How would you determine if an applications development project team was using secure coding practices?

Filed Under: 5b: Computer Application Security Tagged With:

Question 3

April 29, 2025 by Kelly McKain-D'Andria 27 Comments

How would you go about creating an information risk profile for a small start-up business? Describe what the risk profile for the business would contain?  How should the business use the risk profile?

Filed Under: 1c: Risk Evaluation Tagged With:

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 3
  • Page 4
  • Page 5
  • Page 6
  • Go to Next Page »

Primary Sidebar

Questions about the Readings and Case Studies

  • 0a: Course Introduction & Webinar (1)
  • 0b: Understanding an Organization's Risk Environment (4)
  • 1a: Case Study 1 Snowfall and a stolen laptop (3)
  • 1b: Data Classification Process and Models (4)
  • 1c: Risk Evaluation (4)
  • 2a: Case Study 2 Autopsy of a Data Breach: The Target Case (4)
  • 2b: Creating a Security Aware Organization (4)
  • 2c: Physical and Environmental Security (3)
  • 3b Case Study 3 A Hospital catches the Millennium Bug (4)
  • 3c: Business Continuity and Disaster Recovery (4)
  • 4a: Team Project Instructions (1)
  • 4b: Network Security (4)
  • 4c: Cryptography Public Key Encryption and Digital Signatures (4)
  • 5a: Identity Management and Access Control (4)
  • 5b: Computer Application Security (4)

Copyright © 2026 · Course News Pro on Genesis Framework · WordPress · Log in