Due before class:
Watch this Video:
Read the following:
- Kyriazoglou, Chapter 6
- “The Security Processes You Must Get Right”, https://drive.google.com/a/temple.edu/file/d/0B8S2SZTC04Via3RrMk1lY3VkRVk/view?usp=sharing
- “DOS Attacks—A Cyberthreat and Possible Solutions”, https://drive.google.com/a/temple.edu/file/d/0B8S2SZTC04ViSFFmeFBRcU90Zm8/view?usp=sharing
- COBIT 5: Enabling Processes – APO13 https://drive.google.com/a/temple.edu/file/d/0B8S2SZTC04ViYVRpUWxTczU4RXM/view?usp=sharing
Consider the following case:
- iPremier: Denial of Service Attack (Graphic Novel Version), 609092-PDF-ENG
Resources:
- Data Breach Cost Calculator, http://www.hubinternational.com/business-insurance/cyber-risk-solutions/tools/data-breach-cost-calculator/
- “Did the FBI really say “pay up” for ransomware? Here’s what to do…”, https://nakedsecurity.sophos.com/2015/10/28/did-the-fbi-really-say-pay-up-for-ransomware-heres-what-to-do/
- “The Stratfor Breach”, https://www.youtube.com/watch?v=ItreEs03A2k
Jan Yeaomans Slides - week-12-slides
.menu-item-settings