- Describe the nature of IT network security and major types of security risks (e.g., DoS attacks)
- Discuss the importance of a secure and reliable IT network for doing business
- Identify key elements and issues in post-crisis communication by IT leadership
- Discuss the importance of information privacy for doing business
Online section students will complete B+C+Assignments
A. Campus Class Meeting Agenda
- Case Discussion 4
- Individual Assignment on Analytics - B
B. EIA for Online Section Only (3 hours per session)
-
Virtual Case Discussion 4 & Individual Assignment on Analytics – B (1.5 hour on WiZIQ)
- Virtual Team Project Forum 4 (1 hour on VoiceThread) led by Team D
- Team Project Work (30 minutes)
- What's wrong with you pa$$w0rd? by CMU Professor Lorrie Cranor (17:41)
- Microsoft's XBox hacked by a 5-year-old (10 minutes)
- I Was a Cyberthreat to My Company. Are You? (20 minutes)
- What exactly is encryption (Wall Street Journal)
- The HeartBleed Bug (20 minutes)
- Fired Bernie Sanders aide: I wasn't peeking at Clinton data files
- Computer glitch allows 3,000 inmates early release in Washington state
- 5 most embarrassing software bugs in history
- Defending Your Networks: Lessons from the Pentagon, featuring Admiral James Winnefeld, former Vice Chairman of the Joint Chiefs of Staff, Christopher Kirchhoff, Special Assistant to the Chairman of the Joint Chiefs of Staff, and Professor David Upton of the University of Oxford’s Saïd Business School (Harvard Business Review)
- The Cybersecurity Challenge of the IoT, featuring Christopher J. Rezendes, president of INEX Advisors, and David Stephenson, author of SmartStuff: An Introduction to the Internet of Things (Harvard Business Review)
Executive summary available here
Readings
Quiz 5
Individual Assignment on Case Analysis 1 (IAC5)
Individual Assignment on Analytics B (IAA-B)
Team Assignment (TA5)
- To be completed BEFORE Quiz 5
- Gallaugher Chapter 5: Moore's Law
- Callaugher Chapter 8: Network Effects
- Gallaugher Chapter 18: Google for Online Advertising
- To be completed BEFORE Virtual Case Discussion 5 and Individual Assignment 5
- Austin Chapter 13: Emerging Technology
- Austin Chapter 14: Vendor Partnering
- Austin Chapter 15: Managing Talent
- IT talent shortage hitting healthcare hardest
- Austin Chapter 16: Standardization
- Austin Chapter 17: Innovation
- Finding the speed to innovate (McKinsey)
An introduction to information security
NSA's hacking chief: Internet of things security keeps me up at night
Privacy by Design is a concept that was developed by the former Information and Privacy Commissioner of Ontario, Dr. Ann Cavoukian, back in the 90’s, to address the ever-growing and systemic effects of Information and Communication Technologies, and of large–scale networked data systems.
DataLossDB is a database of data breach incidents
Repelling the Cyberattackers by McKinsey
Protecting the enterprise with cybersecure IT architecture
Target appoints new CIO after massive data security breach (10 minutes)
How Malware Can Track Your Smartphone Without Using Location Data
Lenovo PCs ship with man-in-the-middle adware that breaks HTTPS connections
Data Privacy Lab at Harvard UniversityCybersecurity Framework version 1.0 by NIST
Feds Indict Three in 2011 Epsilon Hack
TV Show: CSI: Cyber
How the HeartBleed Bug works by xkcd.com
This comment has been removed by the author.
ReplyDeleteThe link for the "Defending your network" seems to have an issue. The link is available below.
Deletehttps://hbr.org/webinar/2015/10/defending-your-networks-lessons-from-the-pentagon
ReplyDeleteThank you Mitrashi!
DeleteThis web site is usually a walk-through rather than the data it suited you about it and didn’t know who to inquire about. Glimpse here, and you’ll definitely discover it. white house market
ReplyDelete