Download Tài liệu học tập miễn phí Chứng chỉ quốc tế
Lecture Professional practices in information technology - Lecture 32: Risk management. After studying this chapter you will be able to understand: Introduction, risk management, risk identification, risk assessment, documenting the results of risk assessment.
After studying this chapter you will be able to understand: Information security departments are created primarily to manage IT risk; managing risk is one of the key responsibilities of every manager within the organization; in any well-developed risk management program, two formal processes are at work; Risk identification and assessment, risk control.
Lecture Professional practices in information technology - Lecture 30: Information security. After studying this chapter you will be able to understand: Organizational structures, roles and responsibilities, information classification, risk management.
After studying this chapter you will be able to understand: The CIA; security governance; policies, procedures, etc; organizational structures; roles and responsibilities; information classification; risk management.
Intellectual Property simply defined is any form of knowledge or expression created with one's intellect. It includes such things as inventions; computer software; trademarks; literary, artistic, musical, or visual works; and even simply know-how. There are various forms of statutory protection for Intellectual Property, but the two that are most likely to be relevant in the University environment are copyright and patents.
Intellectual Property simply defined is any form of knowledge or expression created with one's intellect. It includes such things as inventions; computer software; trademarks; literary, artistic, musical, or visual works; and even simply know-how.
After studying this chapter you will be able to understand: Works Cited: Book in a series, article in a journal, article in a newspaper or magazine, an entire web site, a page on a web site, what is the vancouver referencing technique? Referencing, harvard style, vancouver style.
Lecture Professional practices in information technology - Lecture 25: Referencing. After studying this chapter you will be able to understand: In-text referencing systems, number-note referencing systems, types of referencing, number-note referencing systems, works cited.
Lecture Professional practices in information technology - Lecture 24: Referencing. After studying this chapter you will be able to understand: Introduction of plagiarism, types of plagiarism, implications of plagiarism, referencing, types of referencing, style of referencing.
Lecture 23: Plagiarism and referencing. After studying this chapter you will be able to understand: What is plagiarism? Examples of plagiarism, terminology: copyright, legal implications, what are the purposes of referencing? What should be referenced?
Lecture 22 - Ethical hacking. After studying this chapter you will be able to understand: Ethical hacking, what you can do legally as an ethical hacker, what you cannot do as an ethical hacker.
Lecture 21 - Computer security ethics. After studying this chapter you will be able to understand: Hackers’ code of ethics, new(er) hacker ethics, security threats, ethical issues in security courses.
After studying this chapter you will be able to understand: Modes of hacker attack, spoofing, IP spoofing – flying-blind attack, IP spoofing – source routing, email spoofing, web spoofing, web spoofing – tracking state, session hijacking, session hijacking, denial of service (DOS) attack,...
After studying this chapter you will be able to understand: Modes of hacker attack, spoofing, IP spoofing – flying-blind attack, IP spoofing – source routing, email spoofing, web spoofing, web spoofing – tracking state, session hijacking, session hijacking, denial of service (DOS) attack,...
Lecture 15: Ethics and social media. After studying this chapter you will be able to understand: Why ethics? Vacuum of rules, conceptual muddles, social use environment, marketing, relationships in the some era? The political, terror in somes, literature.
Lecture 14: Ethics and social media. After studying this chapter you will be able to understand: Privacy questions different to ’traditional’ issues, expectations of on-line privacy, privacy in SoMes, user generated content, property (immaterial).
Lecture 13 - Ethics and social media. After studying this chapter you will be able to understand: Why ethics? Motivation; ethics, applied ethics and morals; the aim(s) of ethics; some ethical theories (and their applications); social media: examples of issues in privacy, property, teaching, friendship.
Lecture 10 - Social media and its impacts on society. After studying this chapter you will be able to understand: What is social media? social media impact, social media circles, enhance social media with cross links, integrating social media.
After studying this chapter you will be able to understand: What ethical, social, and political issues are raised by information systems? What specific principles for conduct can be used to guide ethical decisions? Why do contemporary information systems technology and the Internet pose challenges to the protection of individual privacy and intellectual property? How have information systems affected everyday life?
Lecture 19 - Hacking. After studying this chapter you will be able to understand: Security is much larger than just packets, firewalls, and hackers. Security includes: Policies and procedures; liabilities and laws; human behavior patterns; corporate security programs and implementation; technical aspects- firewalls, intrusion detection systems, proxies, encryption, antivirus software, hacks, cracks, and attacks.
Lecture 8 - Ethical and social issues in information systems (continued). After studying this chapter you will be able to understand: What ethical, social, and political issues are raised by information systems? What specific principles for conduct can be used to guide ethical decisions? Why do contemporary information systems technology and the Internet pose challenges to the protection of individual privacy and intellectual property? How have information systems affected everyday life?
Lecture 18 - Hacking (continued). After studying this chapter you will be able to understand: Why do people hack? The psycology of hackers, types of hacking, password hacking, IP address, port, hacking tools, scanners, telnet, FTP.
Lecture 7 - Ethical and social issues in information systems. After studying this chapter you will be able to understand: What ethical, social, and political issues are raised by information systems? What specific principles for conduct can be used to guide ethical decisions? Why do contemporary information systems technology and the Internet pose challenges to the protection of individual privacy and intellectual property? How have information systems affected everyday life?
Lecture 17: Introduction to Hacking. After studying this chapter you will be able to understand: What is network security? Hacking, history of hacking, who is hacker? Who is cracker? Why do crackers exist? Difference between hacker & cracker, which operating system hacker use.
After studying this chapter you will be able to understand: What is cyberethics? cybertechnology, summary of four phases of cyberethics, are cyberethics issues unique? uniqueness issue, what are cybertechnologies? What is the history of cyberetchics? Uniquesness of cyberethics.
Lecture 12 - Social media and its impacts on society (continued). After studying this chapter you will be able to understand: Social media - Differentiating your unique brand, enhance social media with cross links, tips to enhance social media platforms, integrating social media, types of social networkers, privacy concerns, security issues.
Lecture 4 - Professional ethics & codes of conduct. After studying this chapter you will be able to understand: ethical decision making, applying the code, nine cases, other applicable codes.
Lecture 11 Social media & its impacts on society. After studying this chapter you will be able to understand: LinkedIn, Blogs/Discussion forums, YouTube, Lesser Extent: Twitter and Facebook. This lecture introduces you to social media & its impacts on society.
Traditionalists and uniqueness proponents are each partly correct. Traditionalists correctly point out that no new ethical issues have been introduced by computers. Uniqueness proponents are correct in that cybertechnology has complicated our analysis of traditional ethical issues.
After studying this chapter you will be able to understand: Professionalism, traits of a professional, IEEE code of ethics, motivation for “code of ethics”, ACM code of ethics, ethical decision making, applying the code,...