Unit Outline Information Security Risks, Part II - PowerPoint PPT Presentation

1 / 5
About This Presentation
Title:

Unit Outline Information Security Risks, Part II

Description:

Unit Outline Information Security Risks, Part II Module 1: Password Security Module 2: Wireless Security Module 3: Unintentional Threats Module 4: Insider Threats – PowerPoint PPT presentation

Number of Views:47
Avg rating:3.0/5.0
Slides: 6
Provided by: mba3
Learn more at: https://www.albany.edu
Category:

less

Transcript and Presenter's Notes

Title: Unit Outline Information Security Risks, Part II


1
Unit OutlineInformation Security Risks, Part II
  • Module 1 Password Security
  • Module 2 Wireless Security
  • Module 3 Unintentional Threats
  • Module 4 Insider Threats
  • Module 5 Miscellaneous Threats
  • ? Module 6 Summary

2
Module 6Summary
3
Summary Information Security Risks, Part II
  • Password security needs to be managed by new
    technology.
  • Wireless is not secure period!
  • Accidental and environmental threats need to be
    accounted in the risk analysis.
  • Insider threats are perhaps more important than
    existing hacking.
  • Social factors are used by malicious hackers to
    gain inside access.

4
Suggested Reading Information Security Risks,
Part II
  • Flickenger, R. (2003). Wireless Hacks 100
    Industrial-Strength Tips Tools. Cambridge,
    England OReilly Media, Inc.
  • Hurley, C. (2004). War Driving Drive, Detect,
    Defend A Guide to Wireless Security. Rockland,
    MA Syngress Publishing, Inc.
  • Office of Information and Communications
    Technology. (2003). Part 2 Examples of Threats
    and Vulnerabilities. Information Security
    Guideline for NSW Government. http//www.oit.nsw.g
    ov.au/pdf/4.4.17.IS2.pdf
  • Parker, T. (2004). Cyber Adversary
    Characterization Auditing the Hacker Mind.
    Syngress Publishing Rockland, MA.
  • Vladimirov, A.A., Gavrilenko, K.V., Mikhailovsky,
    A.A. (2004). Wi-Foo The Secrets of Wireless
    Hacking. Addison-Wesley Professional.

5
AcknowledgementsGrants and Personnel
  • Support for this work has been provided through
    grants from the following agencies
  • National Science Foundation (NSF 0210379)
  • Department of Education (FIPSE)
  • Damira Pon, from the Center of Information
    Forensics and Assurance contributed extensively
    by reviewing and editing the material
  • Robert Bangert-Drowns from the School of
    Education reviewed the material from a
    pedagogical view.
  • Melissa Dark Ting Zhuang from Purdue University
    provided a critique of the material and
    facilitated creation of a distance delivery
    version of the course.
Write a Comment
User Comments (0)
About PowerShow.com