BUS171 Information Systems and Operations

Topic 14: Information Security Management

Threats
Email Phishing

Email Spoofing

How to spoof email

SQL injection attacks and how to prevent them through secure coding

The HeartBleed Bug explained

The HeartBleed Bug in a comic strip

Technical Safeguards
What exactly is encryption (Wall Street Journal)

Hash Function

Cryptographic Algorithm

Introduction to asymmetric key cryptography

How asymmetric encryption works

SSL Certificates: Serving secure web content over HTTPS

SQL injection attacks and how to prevent them through secure coding

Blockchain

Explanation of the Blockchain demo site

More on Blockchain

Blockchain

Human Safeguards
I Was a Cyberthreat to My Company. Are You? (20 minutes)

What's wrong with you pa$w0rd? by CMU Professor Lorrie Cranor (17:41)

Idea to retire: Information security is IT security 
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest

No comments:

Post a Comment

Home
Subscribe to: Posts (Atom)

Weekly Materials

  • Home
  • Topic 1: Introduction
  • Topic 2: Business Processes
  • Topic 3: Strategy and Competitive Advantage
  • Topic 4: Hardware and Software
  • Topic 5: Database Processing
  • Topic 7: The Cloud
  • Topic 8: e-Commerce & Digital Marketing
  • Topic 11: Business Intelligence Systems
  • Topic 12: Information Systems Development
  • Topic 14: Information Security Management
  • Team Project
  • Guest Speakers

About Me

My photo
Rachel Chung
Clinial Associate Professor of Business Analytics at the Mason School of Business, College of William & Mary
View my complete profile
Awesome Inc. theme. Theme images by Ollustrator. Powered by Blogger.