w3_3_Ethics Security_2_Sp12

w3_3_Ethics Security_2_Sp12 - Ethics, Privacy, and...

Info iconThis preview shows pages 1–8. Sign up to view the full content.

View Full Document Right Arrow Icon
Ethics, Privacy, and Information Security 2 Agenda 1. Review: Polyline? Purpose? 3D? Purpose? 2. Threats to Information Security 3. Protecting Information Resources IE 332 1.27.12
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
TED Ideas worth spreading http://www.ted.com/index.php/talks/johnn y_lee_demos_wii_remote_hacks.html More on http://www.ted.com/ 2 What can we learn?
Background image of page 2
Attendance Check your attendance! 3
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Factors Increasing Threats to Information Security 1. Net: interconnected, interdependent, wirelessly-networked business environment 2. Government legislation 3. Smaller, faster, cheaper computers and storage devices 4. Decreasing skills necessary to be a computer hacker 5. International organized crime turning to cybercrime 6. Downstream liability 7. Increased employee use of unmanaged devices 8. Lack of management support 4
Background image of page 4
Do we like Unmanaged Devices? Wi-Fi at McDonalds Wi-Fi at Starbucks Hotel Business Center 5
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Categories of Threats to Information Systems 1. Unintentional acts 2. Natural disasters 3. Technical failures 4. Management failures 5. Deliberate acts 6. Man-made disasters Let’s consider each of them 6
Background image of page 6
1. Unintentional Acts
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 8
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 02/22/2012 for the course IE 332 taught by Professor Staff during the Spring '08 term at Purdue University-West Lafayette.

Page1 / 29

w3_3_Ethics Security_2_Sp12 - Ethics, Privacy, and...

This preview shows document pages 1 - 8. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online