• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • HomePage
  • Instructor
  • Syllabus
  • Schedule
    • Week 01: Introduction
    • Week 02: Security and Risk Management
    • Week 03: Asset Security
    • Week 04: Security Engineering
    • Week 05: Communication and Network Security
    • Week 06: Identity and Access Management
    • Week 07: Security Assessment and Testing
    • Week 08: Security Operations
    • Week 9: Software Development Security
  • Assignments
    • Reading Assignments
    • Weekly Discussion Questions
    • In the News Article
    • Team Presentation
  • Quizzes
  • Webex
  • Group Project Discussion
    • Team 1 – Banking
    • Team 2 – Healthcare
    • Team 3 – Power Utility
    • Team 4 – Retail

Cyber Security Capstone

Temple University

Week 02: Security and Risk Management

Week 02: DQ – Cybercrime

May 20, 2019 by Brock Donnelly

A fair to large amount of technical threats can be mitigated through administrative controls. One could think of administrative controls harshly as “idiot rules” as a lot of administrative controls protect personal procedures, general access from unauthorized roles or the common internal mistake.
Administrative controls extend further then just fool proofing, they also involve security policies, information classification, investigations and testing. Security policies, security awareness programs, testing and separation of duties are all preventive controls to prevent technical threat agents from committing cybercrime. Security policies ensure that information technology is aligned with the organizations goals and risk matrix. Testing ensures new deployments will not create weaknesses in existing fortified units and the separation of duties will prevent unauthorized users from gaining access to corporate areas without the enterprises authority.
Investigations along with monitoring and supervising are detective administration controls. These controls protect the enterprise from technical threats by providing information. When threats become problems, information is your best friend. Information found from monitoring and investigations can aid in reversing extremely problematic situations.
Administrative controls are the for-runner of the physical, technical and administrative pyramid as Administrative controls can determine both your physical and technical controls. An enterprise should have thorough administrative controls in place and reviews regularly.

Week 02: DQ – Cybercrime

May 20, 2019 by William Bailey 19 Comments

As an Information Security professional, how do administrative controls, such as policies, procedures, frameworks, help protect you from the technical threats of cybercrime?

Week 2: In the News – Cybercrime

May 20, 2019 by William Bailey 24 Comments

Research, identify, write and post a summary, and be prepared to discuss in class an article you found about a current event in the Information Security arena. For this week’s theme, research a current cybercrime theme – such as a recent attack,  or management research on how organizations are dealing with cybercrime.

Primary Sidebar

Weekly Discussions

  • Week 01: Introduction (1)
  • Week 02: Security and Risk Management (3)
  • Week 03: Asset Security (2)
  • Week 04: Security Engineering (2)
  • Week 05: Communication and Network Security (3)
  • Week 06: Identity and Access Management (1)
  • Week 07: Security Assessment and Testing (2)
  • Week 08: Security Operations (2)
  • Week 09: Software Development Security (2)
  • Week 10: New Trends (2)
  • Week 11: Incident Response (2)
  • Week 12: IT Security (2)

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in