• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Protection of Information Assets

Temple University

Protection of Information Assets

MIS 5206.951 ■ Summer 2026 ■ Kelly McKain-D'Andria
  • Welcome
  • Instructor
  • Syllabus with Readings (Start reading now!)
  • Team Project Preparation

1b: Data Classification Process and Models

Wrap Up

June 21, 2025 by Kelly McKain-D'Andria

Lecture presentation

Quiz and solutions

Filed Under: 1b: Data Classification Process and Models Tagged With:

Question 1

April 29, 2025 by Kelly McKain-D'Andria 28 Comments

What are the 3 types of risk mitigating controls? Which is the most important?  Why is it the most important?

Filed Under: 1b: Data Classification Process and Models Tagged With:

Question 2

April 29, 2025 by Kelly McKain-D'Andria 28 Comments

How would you apply the security categorization standards (FIPS 199) to decide if each of the information security risk mitigations (“safeguards”) described in the Guidelines for Providing Appropriate Access to Geospatial Data in Response to Security Concerns are needed?

Filed Under: 1b: Data Classification Process and Models Tagged With:

Question 3

April 29, 2025 by Kelly McKain-D'Andria 28 Comments

Which two information security objectives could be put at risk if the mitigations (i.e. “safeguards”) recommended by the Guidelines for Providing Appropriate Access to Geospatial Data in Response to Security Concerns are applied?  Explain how each of the security objectives is put at risk by the safeguards.

Filed Under: 1b: Data Classification Process and Models Tagged With:

Primary Sidebar

Questions about the Readings and Case Studies

  • 0a: Course Introduction & Webinar (1)
  • 0b: Understanding an Organization's Risk Environment (4)
  • 1a: Case Study 1 Snowfall and a stolen laptop (3)
  • 1b: Data Classification Process and Models (4)
  • 1c: Risk Evaluation (4)
  • 2a: Case Study 2 Autopsy of a Data Breach: The Target Case (4)
  • 2b: Creating a Security Aware Organization (4)
  • 2c: Physical and Environmental Security (3)
  • 3b Case Study 3 A Hospital catches the Millennium Bug (4)
  • 3c: Business Continuity and Disaster Recovery (4)
  • 4a: Team Project Instructions (1)
  • 4b: Network Security (4)
  • 4c: Cryptography Public Key Encryption and Digital Signatures (4)
  • 5a: Identity Management and Access Control (4)
  • 5b: Computer Application Security (4)

Copyright © 2026 · Course News Pro on Genesis Framework · WordPress · Log in