W09_MGCR331_Sessions_11_12_sv

W09_MGCR331_Sessions_11_12_sv - MGCR 331 Information...

Info iconThis preview shows pages 1–9. Sign up to view the full content.

View Full Document Right Arrow Icon
Sessions 11 and 12 Information Security MGCR 331 – Information Systems IT Impacts on Organizations
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Join a Discussion with Business Executives LEVERAGING TECHNOLOGY IN BUSINESS FEATURING SPEAKERS FROM ELECTRONIC ARTS, TOON BOOM ANIMATION, MORGAN STANLEY TECHNOLOGY AND IBM FEBRUARY 11 TH , 2009 (WED), 1-2:30 P.M. 6 TH FLOOR LOUNGE, BRONFMAN BUILDING 1001 SHERBROOKE STREET WEST IN PARTNERSHIP WITH MCGILL ENGINEERING CAREER CENTRE YOU ARE INVITED TO JOIN US FOR A DISCUSSION WITH REPRESENTATIVES FROM ELECTRONIC ARTS, MORGAN STANLEY, IBM GLOBAL BUSINESS SERVICES AND TOON BOOM ANIMATION ON WEDNESDAY FEBRUARY 11TH. Panelists: Alex Hyderlex, Producer, Electronic Arts Bob Rafues, Associate Partner, IBM GBS Ranjit Samra, Executive Director, Morgan Stanley Technology Joan Vogelesand, CEO, Toon Boom Aimation
Background image of page 2
Before we Begin Assignment 1 (Job Postings) Due next class (hard copy) and have a copy for yourself Due on WebCT tomorrow night at 10:59pm (Feb 11 th ) Individual or in team Wiki Assignment now posted on WebCT Teams have been assigned Wiki creator creates wiki, others accept invitation and sign up to wiki Part A of the project: Due March 5 (10:59 on WebCT) Part B: Due March 19 (10:59 on WebCT)
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
How was the Mid-Term? I was really p. .. Represented mo. Much of the ex. Too hard compa. No Comments! 0% 0% 0% 0% 0% A. I was really prepared and the exam went well B. Represented mostly what we learned in class but some questions were ambiguous/hard C. Much of the exam was not covered in class D. Too hard compared to what we learned E. No Comments!
Background image of page 4
Today’s Class Identify the many threats to information security Examine the various defense mechanisms used to protect information systems
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Information Security http://www.youtube.com/watch?v=UFCoiRHuAyw&NR=1
Background image of page 6
Information Security Summer 2008: Obama campaign system hacked; files on policy positions stolen from system by foreign entities, possibly to hold for future negotiations (FBI) August 2008: McCain system hacked Nov 5 (1day after election): phishing attack targeted millions of PCs in email form, claiming to show videos of acceptance speech whereas link contained trojan that recorded information from system and sent it to foreign servers (http://www.crn.com/ security/212001297)
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Key Information Security Terms Information Resources IS controls to protect system
Background image of page 8
Image of page 9
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 08/06/2009 for the course MGCR mgcr-331 taught by Professor Addas during the Winter '09 term at McGill.

Page1 / 42

W09_MGCR331_Sessions_11_12_sv - MGCR 331 Information...

This preview shows document pages 1 - 9. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online