• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Protection of Information Assets

Temple University

Protection of Information Assets

MIS 5206.951 ■ Summer 2026 ■ Kelly McKain-D'Andria
  • Welcome
  • Instructor
  • Syllabus with Readings (Start reading now!)
  • Team Project Preparation

1c: Risk Evaluation

Wrap Up

June 21, 2025 by Kelly McKain-D'Andria

COBIT 5 Enabling Processes 

NIST SP 800-60v1r1 – Guide for mapping information types to security categories

NIST SP 800-60v2r1 – Appendix

Lecture presentation

Quiz and solutions

 

Filed Under: 1c: Risk Evaluation Tagged With:

Question 1

April 29, 2025 by Kelly McKain-D'Andria 26 Comments

What is meant by the term “acceptable information system security risk”? Who within the organization determines what is the acceptable level of information system risk? How does an organization determine what is an acceptable level of risk?

Filed Under: 1c: Risk Evaluation Tagged With:

Question 2

April 29, 2025 by Kelly McKain-D'Andria 29 Comments

What is an information risk profile? How is it used?  Why is it critical to the success of an organization’s risk management strategies and activities?

Filed Under: 1c: Risk Evaluation Tagged With:

Question 3

April 29, 2025 by Kelly McKain-D'Andria 27 Comments

How would you go about creating an information risk profile for a small start-up business? Describe what the risk profile for the business would contain?  How should the business use the risk profile?

Filed Under: 1c: Risk Evaluation Tagged With:

Primary Sidebar

Questions about the Readings and Case Studies

  • 0a: Course Introduction & Webinar (1)
  • 0b: Understanding an Organization's Risk Environment (4)
  • 1a: Case Study 1 Snowfall and a stolen laptop (3)
  • 1b: Data Classification Process and Models (4)
  • 1c: Risk Evaluation (4)
  • 2a: Case Study 2 Autopsy of a Data Breach: The Target Case (4)
  • 2b: Creating a Security Aware Organization (4)
  • 2c: Physical and Environmental Security (3)
  • 3b Case Study 3 A Hospital catches the Millennium Bug (4)
  • 3c: Business Continuity and Disaster Recovery (4)
  • 4a: Team Project Instructions (1)
  • 4b: Network Security (4)
  • 4c: Cryptography Public Key Encryption and Digital Signatures (4)
  • 5a: Identity Management and Access Control (4)
  • 5b: Computer Application Security (4)

Copyright © 2026 · Course News Pro on Genesis Framework · WordPress · Log in