Session 5: Privacy & Security Issues (10.23.2018)

Learning Objectives
  • Describe the nature of IT network security and major types of security risks (e.g., DoS attacks)
  • Discuss the importance of a secure and reliable IT network for doing business
  • Identify key elements and issues in post-crisis communication by IT leadership 
  • Discuss the importance of information privacy for doing business
Campus section students will complete A+C+Assignments
Online section students will complete B+C+Assignments

A. Campus Class Meeting Agenda

  • Case Discussion 4
  • Individual Assignment on Analytics - B

B. EIA for Online Section Only (3 hours per session)
  • Virtual Case Discussion 4 & Individual Assignment on Analytics – B (1.5 hour on WiZIQ)
  • Virtual Team Project Forum 4 (1 hour on VoiceThread) led by Team D
  •  Team Project Work (30 minutes) 
C. EIA for Campus and Online Sections (3 hours per session)
Assignments Due Before Next Session Begins (12 hours of studies outside classroom) 

Readings
Quiz 5
Individual Assignment on Case Analysis 1 (IAC5)
Individual Assignment on Analytics B (IAA-B)
Team Assignment (TA5)
  • To be completed BEFORE Quiz 5
  1. Gallaugher Chapter 5: Moore's Law
  2. Callaugher Chapter 8: Network Effects
  3. Gallaugher Chapter 18: Google for Online Advertising
    •  To be completed BEFORE Virtual Case Discussion 5 and Individual Assignment 5 
    1. Austin Chapter 13: Emerging Technology
    2. Austin Chapter 14: Vendor Partnering
    3. Austin Chapter 15: Managing Talent
    4. IT talent shortage hitting healthcare hardest
    5. Austin Chapter 16: Standardization
    6. Austin Chapter 17: Innovation
    7. Finding the speed to innovate (McKinsey)
      • IAC5 in Moodle
      • IAA-B in Moodle
      • Individual Quiz 5 in Moodle
      • TA5
      Additional Resources: Feel free to use these resources to enhance your case analyses, discussion, discussions, or team assignments

      An introduction to information security

      NSA's hacking chief: Internet of things security keeps me up at night

      Privacy by Design is a concept that was developed by the former Information and Privacy Commissioner of Ontario, Dr. Ann Cavoukian, back in the 90’s, to address the ever-growing and systemic effects of Information and Communication Technologies, and of large–scale networked data systems.

      DataLossDB is a database of data breach incidents

      Repelling the Cyberattackers by McKinsey

      Protecting the enterprise with cybersecure IT architecture


      Target appoints new CIO after massive data security breach (10 minutes) 

      How Malware Can Track Your Smartphone Without Using Location Data

      Lenovo PCs ship with man-in-the-middle adware that breaks HTTPS connections

      Data Privacy Lab at Harvard University

      Cybersecurity Framework version 1.0 by NIST 

      Feds Indict Three in 2011 Epsilon Hack

      TV Show: CSI: Cyber 

      How the HeartBleed Bug works by xkcd.com










       

      5 comments:

      1. This comment has been removed by the author.

        ReplyDelete
        Replies
        1. The link for the "Defending your network" seems to have an issue. The link is available below.

          Delete
      2. https://hbr.org/webinar/2015/10/defending-your-networks-lessons-from-the-pentagon

        ReplyDelete
      3. This web site is usually a walk-through rather than the data it suited you about it and didn’t know who to inquire about. Glimpse here, and you’ll definitely discover it. white house market

        ReplyDelete