Session 5: Privacy & Security Issues

Learning Objectives
  • Describe the nature of IT network security and major types of security risks (e.g., DoS attacks)
  • Discuss the importance of a secure and reliable IT network for doing business
  • Identify key elements and issues in post-crisis communication by IT leadership
  • Discuss the importance of information privacy for doing business

A. Campus Class Meeting Agenda

Guest Speaker: TBD

B. EIA for the week (3 hours per session)



Assignments Due Before Next Session Begins (12 hours of studies outside classroom)

  • Readings
  • Quiz 5
  • Individual Assignment on Case Analysis 1 (IAC5)
  • Individual Assignment on Analytics B (IAA-B)
  • Team Assignment (TA5)

To be completed BEFORE Quiz 5
  1. Gallaugher Chapter 5: Moore's Law
  2. Callaugher Chapter 8: Network Effects
  3. Gallaugher Chapter 18: Google for Online Advertising

To be completed BEFORE Virtual Case Discussion 5 and Individual Assignment 5
  1. Austin Chapter 13: Emerging Technology
  2. Austin Chapter 14: Vendor Partnering
  3. Austin Chapter 15: Managing Talent
  4. IT talent shortage hitting healthcare hardest
  5. Austin Chapter 16: Standardization
  6. Austin Chapter 17: Innovation
  7. Finding the speed to innovate (McKinsey)
  • IAC5 in Moodle
  • IAA-B in Moodle
  • Individual Quiz 5 in Moodle
  • TA5 
Additional Resources: Feel free to use these resources to enhance your case analyses, discussion, discussions, or team assignments.
An introduction to information security

NSA's hacking chief: Internet of things security keeps me up at night

Privacy by Design is a concept that was developed by the former Information and Privacy Commissioner of Ontario, Dr. Ann Cavoukian, back in the 90’s, to address the ever-growing and systemic effects of Information and Communication Technologies, and of large–scale networked data systems.

DataLossDB is a database of data breach incidents

Repelling the Cyberattackers by McKinsey

Protecting the enterprise with cybersecure IT architecture

Target appoints new CIO after massive data security breach (10 minutes)

How Malware Can Track Your Smartphone Without Using Location Data

Lenovo PCs ship with man-in-the-middle adware that breaks HTTPS connections Data Privacy Lab at Harvard University

Cybersecurity Framework version 1.0 by NIST

Feds Indict Three in 2011 Epsilon Hack

TV Show: CSI: Cyber

How the HeartBleed Bug works by xkcd.com

No comments:

Post a Comment