Tài liệu miễn phí Chứng chỉ quốc tế

Download Tài liệu học tập miễn phí Chứng chỉ quốc tế

Lecture Professional Practices in IT: Lecture 32

Lecture Professional practices in information technology - Lecture 32: Risk management. After studying this chapter you will be able to understand: Introduction, risk management, risk identification, risk assessment, documenting the results of risk assessment.

12/29/2020 5:51:21 AM +00:00

Lecture Professional Practices in IT: Lecture 31

After studying this chapter you will be able to understand: Information security departments are created primarily to manage IT risk; managing risk is one of the key responsibilities of every manager within the organization; in any well-developed risk management program, two formal processes are at work; Risk identification and assessment, risk control.

12/29/2020 5:51:15 AM +00:00

Lecture Professional Practices in IT: Lecture 30

Lecture Professional practices in information technology - Lecture 30: Information security. After studying this chapter you will be able to understand: Organizational structures, roles and responsibilities, information classification, risk management.

12/29/2020 5:51:09 AM +00:00

Lecture Professional Practices in IT: Lecture 29

After studying this chapter you will be able to understand: The CIA; security governance; policies, procedures, etc; organizational structures; roles and responsibilities; information classification; risk management.

12/29/2020 5:51:03 AM +00:00

Lecture Professional Practices in IT: Lecture 28

Intellectual Property simply defined is any form of knowledge or expression created with one's intellect. It includes such things as inventions; computer software; trademarks; literary, artistic, musical, or visual works; and even simply know-how. There are various forms of statutory protection for Intellectual Property, but the two that are most likely to be relevant in the University environment are copyright and patents.

12/29/2020 5:50:57 AM +00:00

Lecture Professional Practices in IT: Lecture 27

Intellectual Property simply defined is any form of knowledge or expression created with one's intellect. It includes such things as inventions; computer software; trademarks; literary, artistic, musical, or visual works; and even simply know-how.

12/29/2020 5:50:51 AM +00:00

Lecture Professional Practices in IT: Lecture 26

After studying this chapter you will be able to understand: Works Cited: Book in a series, article in a journal, article in a newspaper or magazine, an entire web site, a page on a web site, what is the vancouver referencing technique? Referencing, harvard style, vancouver style.

12/29/2020 5:50:45 AM +00:00

Lecture Professional Practices in IT: Lecture 25

Lecture Professional practices in information technology - Lecture 25: Referencing. After studying this chapter you will be able to understand: In-text referencing systems, number-note referencing systems, types of referencing, number-note referencing systems, works cited.

12/29/2020 5:50:39 AM +00:00

Lecture Professional Practices in IT: Lecture 24

Lecture Professional practices in information technology - Lecture 24: Referencing. After studying this chapter you will be able to understand: Introduction of plagiarism, types of plagiarism, implications of plagiarism, referencing, types of referencing, style of referencing.

12/29/2020 5:50:33 AM +00:00

Lecture Professional Practices in IT: Lecture 23

Lecture 23: Plagiarism and referencing. After studying this chapter you will be able to understand: What is plagiarism? Examples of plagiarism, terminology: copyright, legal implications, what are the purposes of referencing? What should be referenced?

12/29/2020 5:50:27 AM +00:00

Lecture Professional Practices in IT: Lecture 22

Lecture 22 - Ethical hacking. After studying this chapter you will be able to understand: Ethical hacking, what you can do legally as an ethical hacker, what you cannot do as an ethical hacker.

12/29/2020 5:50:21 AM +00:00

Lecture Professional Practices in IT: Lecture 21

Lecture 21 - Computer security ethics. After studying this chapter you will be able to understand: Hackers’ code of ethics, new(er) hacker ethics, security threats, ethical issues in security courses.

12/29/2020 5:50:14 AM +00:00

Lecture Professional Practices in IT: Lecture 20

After studying this chapter you will be able to understand: Modes of hacker attack, spoofing, IP spoofing – flying-blind attack, IP spoofing – source routing, email spoofing, web spoofing, web spoofing – tracking state, session hijacking, session hijacking, denial of service (DOS) attack,...

12/29/2020 5:50:08 AM +00:00

Lecture Professional Practices in IT: Lecture 16

After studying this chapter you will be able to understand: Modes of hacker attack, spoofing, IP spoofing – flying-blind attack, IP spoofing – source routing, email spoofing, web spoofing, web spoofing – tracking state, session hijacking, session hijacking, denial of service (DOS) attack,...

12/29/2020 5:50:02 AM +00:00

Lecture Professional Practices in IT: Lecture 15

Lecture 15: Ethics and social media. After studying this chapter you will be able to understand: Why ethics? Vacuum of rules, conceptual muddles, social use environment, marketing, relationships in the some era? The political, terror in somes, literature.

12/29/2020 5:49:56 AM +00:00

Lecture Professional Practices in IT: Lecture 14

Lecture 14: Ethics and social media. After studying this chapter you will be able to understand: Privacy questions different to ’traditional’ issues, expectations of on-line privacy, privacy in SoMes, user generated content, property (immaterial).

12/29/2020 5:49:50 AM +00:00

Lecture Professional Practices in IT: Lecture 13

Lecture 13 - Ethics and social media. After studying this chapter you will be able to understand: Why ethics? Motivation; ethics, applied ethics and morals; the aim(s) of ethics; some ethical theories (and their applications); social media: examples of issues in privacy, property, teaching, friendship.

12/29/2020 5:49:44 AM +00:00

Lecture Professional Practices in IT: Lecture 10

Lecture 10 - Social media and its impacts on society. After studying this chapter you will be able to understand: What is social media? social media impact, social media circles, enhance social media with cross links, integrating social media.

12/29/2020 5:49:37 AM +00:00

Lecture Professional Practices in IT: Lecture 9

After studying this chapter you will be able to understand: What ethical, social, and political issues are raised by information systems? What specific principles for conduct can be used to guide ethical decisions? Why do contemporary information systems technology and the Internet pose challenges to the protection of individual privacy and intellectual property? How have information systems affected everyday life?

12/29/2020 5:49:31 AM +00:00

Lecture Professional Practices in IT: Lecture 19

Lecture 19 - Hacking. After studying this chapter you will be able to understand: Security is much larger than just packets, firewalls, and hackers. Security includes: Policies and procedures; liabilities and laws; human behavior patterns; corporate security programs and implementation; technical aspects- firewalls, intrusion detection systems, proxies, encryption, antivirus software, hacks, cracks, and attacks.

12/29/2020 5:49:25 AM +00:00

Lecture Professional Practices in IT: Lecture 8

Lecture 8 - Ethical and social issues in information systems (continued). After studying this chapter you will be able to understand: What ethical, social, and political issues are raised by information systems? What specific principles for conduct can be used to guide ethical decisions? Why do contemporary information systems technology and the Internet pose challenges to the protection of individual privacy and intellectual property? How have information systems affected everyday life?

12/29/2020 5:49:19 AM +00:00

Lecture Professional Practices in IT: Lecture 18

Lecture 18 - Hacking (continued). After studying this chapter you will be able to understand: Why do people hack? The psycology of hackers, types of hacking, password hacking, IP address, port, hacking tools, scanners, telnet, FTP.

12/29/2020 5:49:13 AM +00:00

Lecture Professional Practices in IT: Lecture 7

Lecture 7 - Ethical and social issues in information systems. After studying this chapter you will be able to understand: What ethical, social, and political issues are raised by information systems? What specific principles for conduct can be used to guide ethical decisions? Why do contemporary information systems technology and the Internet pose challenges to the protection of individual privacy and intellectual property? How have information systems affected everyday life?

12/29/2020 5:49:07 AM +00:00

Lecture Professional Practices in IT: Lecture 17

Lecture 17: Introduction to Hacking. After studying this chapter you will be able to understand: What is network security? Hacking, history of hacking, who is hacker? Who is cracker? Why do crackers exist? Difference between hacker & cracker, which operating system hacker use.

12/29/2020 5:49:01 AM +00:00

Lecture Professional Practices in IT: Lecture 5

After studying this chapter you will be able to understand: What is cyberethics? cybertechnology, summary of four phases of cyberethics, are cyberethics issues unique? uniqueness issue, what are cybertechnologies? What is the history of cyberetchics? Uniquesness of cyberethics.

12/29/2020 5:48:55 AM +00:00

Lecture Professional Practices in IT: Lecture 12

Lecture 12 - Social media and its impacts on society (continued). After studying this chapter you will be able to understand: Social media - Differentiating your unique brand, enhance social media with cross links, tips to enhance social media platforms, integrating social media, types of social networkers, privacy concerns, security issues.

12/29/2020 5:48:46 AM +00:00

Lecture Professional Practices in IT: Lecture 4

Lecture 4 - Professional ethics & codes of conduct. After studying this chapter you will be able to understand: ethical decision making, applying the code, nine cases, other applicable codes.

12/29/2020 5:48:40 AM +00:00

Lecture Professional Practices in IT: Lecture 11

Lecture 11 Social media & its impacts on society. After studying this chapter you will be able to understand: LinkedIn, Blogs/Discussion forums, YouTube, Lesser Extent: Twitter and Facebook. This lecture introduces you to social media & its impacts on society.

12/29/2020 5:48:34 AM +00:00

Lecture Professional Practices in IT: Lecture 6

Traditionalists and uniqueness proponents are each partly correct. Traditionalists correctly point out that no new ethical issues have been introduced by computers. Uniqueness proponents are correct in that cybertechnology has complicated our analysis of traditional ethical issues.

12/29/2020 5:48:28 AM +00:00

Lecture Professional Practices in IT: Lecture 3

After studying this chapter you will be able to understand: Professionalism, traits of a professional, IEEE code of ethics, motivation for “code of ethics”, ACM code of ethics, ethical decision making, applying the code,...

12/29/2020 5:48:22 AM +00:00