Completing a task relevant to cybersecurity Case 2

Slides:



Advertisements
Similar presentations
Ethics, Privacy and Information Security
Advertisements

AmadeusCybersecurity: the essentials12 th November 2014 Alex van Someren Family Office Forum 12 th November 2014, Zurich Cybersecurity: the essentials.
The Most Critical Risk Control: Human Behavior Lynn Goodendorf Director, Information Security Atlanta ISACA Chapter Meeting June 20, 2014.
David A. Brown Chief Information Security Officer State of Ohio
Creating an Effective Information Security Training, Education and Awareness Programme Annual ISACA Kampala Chapter Information Security Workshop Prof.
A First Course in Information Security
Unit 1 Living in the Digital WorldChapter 3 – Entertain Me This presentation will cover the following topics: What precautions should I take? Name:
© IDT911, LLC. All Rights Reserved — Confidential 0 Cyber and Privacy Breach Coverages.
New A.M. Best Cyber Questionnaire
Weaving Security Blankets Make your own bespoke defensive toolkit Presentation by Max Cizauskas For BSides Toronto 2015.
Chapter 10: Ethics, Privacy, and Security Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter
Your Cyber Security: The scope of your risk is broad and growing To understand the nature of the risk landscape look at the presentations here today-begin.
Friday 22nd April 2016 DS Chris Greatorex SEROCU
Part One Progress Check. Was your result as good as you hoped? The ‘multiple choice’ questions are OK if you know your stuff But the ‘longer’ questions.
Combined DLC/TechMACC Meeting March 14, Topic: Bring Your Own Device/1:1 Today’s Agenda:
BUS 600 Week 6 Final Paper Check this A+ tutorial guideline at ASH/BUS-600-Week-6-Final-Paper The final research.
BUS 508 Week 4 Assignment Internet Technology, Marketing, and Security (Sony Corp) Check this A+ tutorial guideline at
CIS 4930/6930: Systems Security
Law Firm Data Security: What In-house Counsel Need to Know
Your Partner for Superior Cybersecurity
New A.M. Best Cyber Questionnaire
Issues and Protections
John A. Wright, CEO WIPFLI Client Appreciation June 8, 2017
Data Minimization Framework
CHAPTER FOUR OVERVIEW SECTION ETHICS
Managing a Cyber Event Steven P. Gibson President
CIS 502 Course Experience Tradition / snaptutorial.com
HCS 341 Week 5 Human Resource Management Presentation
Technology, Careers, and Job Hunting
Cyber Security & Embedded Systems Training Bootcamp VISIT TONEX.COM.
CIS 349 Competitive Success/snaptutorial.com
CMGT 441 Competitive Success-- snaptutorial.com
CMGT 582 Competitive Success/tutorialrank.com
CYB 110 Education Begins / Snaptutorial.com. CYB 110 All Assignments For more classes visit CYB 110 Week 1 Individual Protecting.
CYB 110 Education Begins / tutorialrank.com. CYB 110 All Assignments For more course tutorials visit CYB 110 Week 1 Individual Protecting.
CMGT 441 Education for Service-- snaptutorial.com
CompTIA CAS-003 Exam Study Material - CompTIA CAS-003 Exam Dumps Realexamdumps.com
CIS 349 RANK Lessons in Excellence-- cis349rank.com.
CMGT 582 Education for Service-- tutorialrank.com.
CIS 349 Education for Service/snaptutorial.com
5G Security Training
CIS 333 RANK Education for Service-- cis333rank.com.
CMGT 441 Teaching Effectively-- snaptutorial.com
CMGT 441 Education for Service-- tutorialrank.com
CYB 110 Education for Service-- tutorialrank.com
CIS 349 Teaching Effectively-- snaptutorial.com
CMGT 441 Inspiring Innovation-- snaptutorial.com
Csilla Farkas Cybersecurity Csilla Farkas
Home Internet Vulnerabilities
SMB practice development: Security play
Navigating Security Seas in a Small Ship with a Limited Crew
Introduction to BYOD EIT, Author Gay Robertson, 2017.
CompTIA Security+ Study Guide (SY0-401)
Cybersecurity compliance for attorneys
SMB practice development: Security play
SP10/ WK-11.
Pima Medical Institute Online Education
How to Mitigate the Consequences What are the Countermeasures?
CHAPTER FOUR OVERVIEW SECTION ETHICS
Pima Medical Institute Online Education
Considerations for Cybersecurity and Data Security in Today’s World
How it affects policies and procedures
DiFens E-MANUAL for Young Entrepreneurs
CYBER SECURITY SPACE OPERATIONS AND RESILIENCY.
LO1 - Know about aspects of cyber security
DATA BREACHES 6 4 , 9 3 There were…
Securely run and grow your business
Provide Employee Security Training Today!
INTRODUCTION TO AZURE AD
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

Completing a task relevant to cybersecurity Case 2 FORMAT of CLASSES Week 6  Week 10 Following the Format of the Final Exam Case 1 Technical Completing a task relevant to cybersecurity Case 2 Cybersecurity concept related to attacks or defense Case 3 Cybersecurity policy and strategy for an organization (small and midsize business)

Technical Case-1: Viewing, deleting, and interpreting cookies

Cyber Security Concept-1:BYOD risks and policies BYOD policies define rules and regulations related to the use of personal devices (smartphones, laptops) by employees at work. https://digitalguardian.com/blog/byod-security-expert-tips-policy-mitigating-risks-preventing-breach https://www.youtube.com/watch?v=PG5MWzFuaMw

Topics of Research Based on today’s discussion Risks created by BYOD (allowing employees to use their own devices at work) and strategies for mitigating these risks. The use of cookies in hacking attacks (cookie forging) Risks created by backing up data on the cloud and strategies for mitigating these risks. Topics based on discussions from last class Data breaches caused by human error Strategies for reducing human error in cybersecurity Deception and Physical Security: The use of deception to access unauthorized spaces Deception and Digital Security: The use of deception (phishing) to access unauthorized web spaces

Go to page 54 of the textbook Define each type of partnership Pick one partnership that you would likely use in the organization where you work or where you plan to work

Find one online community that offers resources and information about cybersecurity The online community should be from the Chapter

Cloud Security: How it works https://www.youtube.com/watch?v=L-cC-JjYos0

Privacy of our data in the cloud and on databases http://cs.txstate.edu/~ch04/webtest/teaching/courses/2315/lectures/quinn/ch5.pdf FBI Agents selling data to businesses Risks caused by unethical employees with privileged access to data

Does the weather affect mood?

Weather, time of the day, and other factors affect concentration and the tendency to make errors. Reducing errors: Four Eyes Principle Checklists https://www.youtube.com/watch?v=RAylY6zneI0