-
security@senko.org wrote a new post on the site Protection of Information Assets 12 years ago
This is the case study for the second portion of the course:
-
security@senko.org wrote a new post on the site Protection of Information Assets 12 years ago
Radware Launches In-Depth Resource for Information Security Professionals
Online Resource Designed to Provide In-Depth Analysis of DoS and DDoS Attack Tools, Terms and […] -
security@senko.org wrote a new post on the site Protection of Information Assets 12 years ago
I am not suggesting that you download this. But, take a look at this set of features as an example of the sort things that are typical in Network Security tools.
-
security@senko.org wrote a new post on the site Protection of Information Assets 12 years ago
Network Security
• Vacca Chapter 4 -13
• “In the News” article
Read and be prepared to discuss: Case 2 -SECURITY BREACH AT TJX -
security@senko.org wrote a new post on the site Protection of Information Assets 12 years ago
15 Tips to Improve Your Infosec Risk Management Practice
http://www.tripwire.com/state-of-security/it-security-data-protection/15-tips-to-improve-your-infosec-risk-management-practice/ -
security@senko.org wrote a new post on the site Protection of Information Assets 12 years ago
Communications and Operations Management: Domain 7 of the Information Security & Privacy Program
https://protect.iu.edu/blog/2012/10/12/communications-and-operations-management-domain-7-information-security-privacy-progr -
security@senko.org wrote a new post on the site Protection of Information Assets 12 years ago
-
security@senko.org wrote a new post on the site Protection of Information Assets 12 years ago
As you may remember for the last couple of sessions I have recommended that you “read ahead of the assignments because the amount of reading next week is significant. Here is another reminder:
– Reading ahead: […]
-
security@senko.org wrote a new post on the site Protection of Information Assets 12 years, 1 month ago
Week 8 – Business Continuity and Disaster Recovery Planning
• Vacca Chapter 38
• “In the News” articleIn class case discussion: Business Continuity Case […]
-
security@senko.org wrote a new post on the site Protection of Information Assets 12 years, 1 month ago
-
security@senko.org wrote a new post on the site Protection of Information Assets 12 years, 1 month ago
-
security@senko.org wrote a new post on the site Protection of Information Assets 12 years, 1 month ago
-
security@senko.org wrote a new post on the site Protection of Information Assets 12 years, 1 month ago
-
security@senko.org wrote a new post on the site Protection of Information Assets 12 years, 1 month ago
10/9 Physical and Environmental Security
• Vacca Chapter 36
• “In the News” article
In class case discussionSANS Assignments 3
-
security@senko.org wrote a new post on the site Protection of Information Assets 12 years, 1 month ago
Attached are the review materials that we will use in class as a refresher before the Mid-term exam in the second portion of the session. The exam is a closed-book test.
-
security@senko.org wrote a new post on the site Protection of Information Assets 12 years, 1 month ago
The assigned reading for week 6: HBR Article – the Myth of Secure Computing
-
security@senko.org wrote a new post on the site Protection of Information Assets 12 years, 1 month ago
The More Things Change, the More Security Change Management Needs to Change
http://www.securityweek.com/more-things-change-more-security-change-management-needs-change -
security@senko.org wrote a new post on the site Protection of Information Assets 12 years, 1 month ago
10/2 Review: Managing IT Security Risk MID-TERM Exam
Prepare for Mid-term Exam
Mid-Term Exam
HBR Assignment 1The first part of the class will be dedicated to a review of the material we covered in […]
-
security@senko.org wrote a new post on the site Protection of Information Assets 12 years, 1 month ago
-
security@senko.org wrote a new post on the site Protection of Information Assets 12 years, 1 month ago
Guarding the Portal: Data Security Needs Rise With Patient Access
iHealthBeat
In both cases, product vendors should provide the fundamentals of security — authentication, auditing and integrity checking — […] - Load More