• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • HomePage
  • About
  • Syllabus
  • Schedule
    • Section 1
      • Week 1: Course Introduction
      • Week 2: Access Controls
      • Week 3: Systems Software Security
      • Week 4: Applications Software Security
      • Week 5: Cryptography Protocols
      • Week 6: Practical Cryptography
      • Week 7: Midterm Exam
    • Section 2
      • Week 8: Business Continuity & Disaster Recovery
      • Week 9: Security Operations
      • Week 10: Physical & Environmental Security
      • Week 11: Security Architecture & Design
      • Week 12: – Network Protocols
      • Week 13: Telecommunications and Network Security
      • Week 14: Risk Management and Compliance
      • Week 15: Final Exam
  • Course Material
    • Case Studies
      • C2.1 (9/11)
      • C4.1 (9/25)
      • C6.1 (10/9)
      • C8.1 (10/23)
      • C9.1 (10/30)
      • C10.1 (11/6)
      • C11.1 (11/13)
    • Practical Assignments
      • PA1.1 (Due 9/11)
      • PA2.1 (Due 9/18)
      • PA4.1 (Due 10/2)
      • PA5 (Due 10/9)
        • PA5.1
        • PA5.2
        • PA5.3
      • PA8.1 (Due 10/30)
      • PA9.1 (Due 11/6)
      • PA10.1 (Due 11/13)
      • PA11.1 ( Due 11/20)
      • PA12.1 (Due 11/27)
      • PA13 (Due 12/4)
        • PA13.1
        • PA13.2
        • PA13.3
    • Written Assignments
      • WA2.1 (Due 9/18)
      • WA3.1 (Due 9/25)
      • WA4.1 (Due 10/2)
      • WA6.1 (Due 10/16)
      • WA8.1 (Due 10/30)
      • WA9.1 (Due 11/6)
      • WA10.1 (Due 11/13)
      • WA12.1 (Due 11/27)
      • WA13.1 (Due 12/4)
  • Webex
  • Gradebook

ITACS 5209 F17

Temple University

12/4 – Risk Management and Compliance

Overview

Almost done!  We’ve done a lot of work this semester… and we can wind down with this last unit, which reviews topics that are tangential securing digital infrastructure, but covered in more detail in other program courses.  We can look at these various topics, and relate back to how they affect topics we covered earlier in the course.

We will look at risk, and how that effects infrastructure, our design decisions, and management of infrastructure security.  We will also look at the various laws and regulations that we would need to be aware of in managing our digital infrastructure, and how these can affect how we secure our infrastructure.

This week’s topics:

  • IT Security Supporting Mission, Goals and Objectives
  • Risk Management
  • Security Management
  • Personnel Security
  • Computer Crime
  • Incident Response
  • Investigations
  • Computer Forensics
  • Professional Ethics

 

In this unit, plan to:

  • Read: pages 809- in the Network Security text
  • Read: pages 2-22, 220-246 in the Security Essentials text
  • Participate: in the weekly discussion forum

Primary Sidebar

Weekly Discussions

  • Uncategorized (12)

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in