CS 3043 Social Implications Of Computing 5/3/2015© 2008 Keith A. Pray 1 Class 12 Risks Keith A. Pray Instructor socialimps.keithpray.net.

Slides:



Advertisements
Similar presentations
Series 2: Project Management Understanding and Using 6 Basic Tools 9/2013 From the CIHS Video Series “Ten Minutes at a Time”
Advertisements

Harrogate and District Health and Safety Forum 17 February 2010 Mike Parish.
CS 3043 Social Implications Of Computing 5/11/2015© 2008 Keith A. Pray 1 Class 10 Work Keith A. Pray Instructor socialimps.keithpray.net.
Recovering from an Attack Version 0.1 March, 2003 Bill Woodcock Packet Clearing House.
ECE 355 Introduction to Computer Networks and Data Communications
CST 481/598 Many thanks to Jeni Li.  Potential negative impact to an asset  Probability of a loss  A function of three variables  The probability.
Future Work Needed Kenneth Wade Najim Yaqubie. Outline 1.Model is simple 2.Too many assumptions 3.Conflicting internal architectures 4.Security Challenges.
Network Security of The United States of America By: Jeffery T. Pelletier.
Nasdaq Japan 1 Case 1-2 NASDAQ Japan. Nasdaq Japan2 The Players l NASDAQ l Softbank Corporation l Osaka Stock Exchange (OSE) l Three limited partners.
CS 290C: Formal Models for Web Software Lecture 1: Introduction Instructor: Tevfik Bultan.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Quantitative.
Lecture 11 Reliability and Security in IT infrastructure.
Assessing the Threat How much money is lost due to cyber crimes? –Estimates range from $100 million to $100s billions –Why the discrepancy? Companies don’t.
IT JOBS TASK 20. SOFTWARE ENGINEER A software engineer designs and programmes software, operates systems, database systems etc. They know how software.
Toward A Reasonable Programmer Standard Responsibility and Negligence in Software Design.
Citadel Security Software Presents Are you Vulnerable? Bill Diamond Senior Security Engineer
Existing Network Study CPIT 375 Data Network Designing and Evaluation.
Strategic Information Systems Planning
CS 3043 Social Implications Of Computing 9/7/2015© 2004 Keith A. Pray 1 Class 7 Crime And Privacy Keith A. Pray Instructor socialimps.keithpray.net.
PAR CONFERENCE Homeland Defense A Provider’s Perspective Lessons from TMI Dennis Felty November 15, 2001.
1 How to 0wn the Internet in Your Spare Time Authors: Stuart Staniford, Vern Paxson, Nicholas Weaver Publication: Usenix Security Symposium, 2002 Presenter:
Definitions What is a network? A series of interconnected computers, linked together either via cabling or wirelessly. Often linked via a central server.
Introduction to Risk Analysis in Healthcare Farrokh Alemi Ph.D. Professor of Health Administration and Policy College of Health and Human Services, George.
NATO Advanced Research Workshop “Best Practices and Innovative Approaches to Develop Cyber Security and Resiliency Policy Framework” Scenario for Discussion.
CS 3043 Social Implications Of Computing 10/15/2015© 2009 Keith A. Pray 1 Class 10 Errors, Failures, And Risk Keith A. Pray Instructor socialimps.keithpray.net.
CS 3043 Social Implications Of Computing 10/19/2015© 2004 Keith A. Pray 1 Class 9 Intellectual Property Keith A. Pray Instructor socialimps.keithpray.net.
CS 3043 Social Implications Of Computing 10/19/2015© 2008 Keith A. Pray 1 Class 7 Intellectual Property Keith A. Pray Instructor socialimps.keithpray.net.
CS 3043 Social Implications Of Computing © 2009 Keith A. Pray Class 3 Professional Ethics Keith A. Pray Instructor socialimps.keithpray.net.
CS 3043 Social Implications Of Computing 10/22/2015© 2008 Keith A. Pray 1 Class 6 Privacy Revisited Keith A. Pray Instructor socialimps.keithpray.net.
Appendix C: Designing an Operations Framework to Manage Security.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Cloud Computing Project By:Jessica, Fadiah, and Bill.
Artificial Intelligence is the field of computer science that studies how machines can be made to act intelligently. The benefit of using The benefit of.
On the Definition of Survivability J. C. Knight and K. J. Sullivan, Department of Computer Science, University of Virginia, December 2000.
CS 3043 Social Implications Of Computing 11/24/2015© 2004 Keith A. Pray 1 Class 12 Risks Keith A. Pray Instructor socialimps.keithpray.net.
CS 3043 Social Implications Of Computing Keith A. Pray Instructor socialimps.keithpray.net CLASS 9 ERRORS FAILURES RISKS © 2014 Keith A. Pray.
Unit 8.2: Effective Implementation Planning HIT Implementation Planning for Quality and Safety Component 12/Unit 81 Health IT Workforce Curriculum Version.
A Global Approach to Protecting the Global Critical Infrastructure Dr. Stephen D. Bryen.
MIS 7003 MIS Core Course The MBA Program The University of Tulsa Professor: Akhilesh Bajaj Security: Personal & Business © Akhilesh Bajaj 2004,2005, 2007,
ORGANIZING IT SERVICES AND PERSONNEL (PART 1) Lecture 7.
Mgmt.101 ~ Introduction to Business Risk Management & Insurance.
IT Security Policy: Case Study March 2008 Copyright , All Rights Reserved.
North American Energy Infrastructure Policy Philip Gonda Steven Mays Robert Floyd Josh Kapp.
What is mainframe? Mainframe is an industry term for a large computer. The name comes from the way the machine is build up: all units (processing, communication.
Chap 8: Administering Security.  Security is a combination Technical – covered in chap 1 Administrative Physical controls SE571 Security in Computing.
CS 3043 Social Implications Of Computing Keith A. Pray Instructor socialimps.keithpray.net GROUP PROJECT MOVIE.
CST 481/598 Many thanks to Jeni Li.  Risk matrix or cube  Cost effectiveness analysis  Annualized Loss Expectancy  Multi-Attribute Risk Assessment.
BTEC NAT Unit 15 - Organisational Systems Security ORGANISATIONAL SYSTEMS SECURITY Unit 15 Lecture 3 OTHER DAMAGING THREATS.
INFORMATION SECURITY MANAGEMENT L ECTURE 8: R ISK M ANAGEMENT C ONTROLLING R ISK You got to be careful if you don’t know where you’re going, because you.
Dr. Mark Gaynor, Dr. Feliciano Yu, Bryan Duepner.
The Current State of Cyber Security and How to Defend Your Data.
HSCIC Cyber Security Presented by: Richard Ives - Stakeholder Engagement Manager IGA Conference - 16 Mar 2016.
RISK & ITS MANAGEMENT. Risk A crisis situation involves : - a threat to resource & people, - a loss of control, - visible and / or invisible effects on.
Lecturer: Eng. Mohamed Adam Isak PH.D Researcher in CS M.Sc. and B.Sc. of Information Technology Engineering, Lecturer in University of Somalia and Mogadishu.
Unit 4: Impact of the Use of IT on Business Systems
Problem Statement and Research Question
Overview of Data Communications Security Concepts
Be Winter Ready Campaign toolkit November 2017.
Advantages & Disadvantages of Outsourcing
Be Winter Ready Campaign toolkit November 2017.
Keeping your data, money & reputation safe
Business Continuity Plan
Security week 1 Introductions Class website Syllabus review
Reliability and Safety
LO1 - Know about aspects of cyber security
Management Information Systems
White Box testing & Inspections
Leveraging AI for Disaster Preparedness and Response
Presentation transcript:

CS 3043 Social Implications Of Computing 5/3/2015© 2008 Keith A. Pray 1 Class 12 Risks Keith A. Pray Instructor socialimps.keithpray.net

CS 3043 Social Implications Of Computing © 2008 Keith A. Pray 2 5/3/2015 Overview 1. Students 2. Risks, Failures, etc. 3. NEXT CLASS: Evaluation Forms (to start 10 minutes before class ends)

CS 3043 Social Implications Of Computing Group Project Groups presenting Monday 1. Live Free Or Die Hard 2. A.I. 3. Lawnmower Man 4. Bicentennialman © 2008 Keith A. Pray 3 5/3/2015

CS 3043 Social Implications Of Computing Group Project If you are not presenting Monday:  For each movie being presented Monday prepare three questions about the movie and group’s work as depicted on their respective websites.  Questions will be handed in  Questions will be typed and have your name  Questions will pertain to the topics covered in this class © 2008 Keith A. Pray 4 5/3/2015

CS 3043 Social Implications Of Computing Cyber warfare Andrew Keating  The concept of cyber warfare has been a possibility for years, but only recently has it become a reality  Why?  As more nations become reliant upon computer systems for their infrastructures, cyber warfare becomes a much more serious threat.  Cyber warfare is cheap!  “You could fund an entire cyber warfare campaign for the cost of replacing a tank tread” – Bill Woodcock, research director of Packet Clearing House  Infrastructures are vulnerable, and knowledge of how to exploit computing systems is widespread © 2008 Keith A. Pray 5 5/3/2015

CS 3043 Social Implications Of Computing Cyberwar Cont’d: The South Ossetia War (Russia v. Georgia) During the South Ossetia War in the summer of 2008, Georgia’s government suffered large-scale distributed denial of service attacks, affecting a wide range of Georgian servers, which included the Ministry of Foreign Affairs and news organizations While bombs and gunfire flooded the streets of Georgia, Russian packets flooded their servers © 2008 Keith A. Pray 6 5/3/2015 Andrew Keating

CS 3043 Social Implications Of Computing Possibilities ([Un]Ethical?) Gaining control over news servers and posting inaccurate information to mislead people Any machine which is visible on the Internet is at risk, could disrupt a country’s entire infrastructure Take down hospitals, power grid, police/fire Damage to civilians could be done accidentally What role will cyber warfare play in the wars of the future? © 2008 Keith A. Pray 7 5/3/2015 Andrew Keating

CS 3043 Social Implications Of Computing CIGNA Healthcare Brendan Dean CIGNA is the 4 th largest health insurer in the country. Had to upgrade its IT infrastructure, some of which dated to the 1980’s. New upgrade would not just move services to new systems but also added a lot of additional services. Projected to cost $1 billion.

CS 3043 Social Implications Of Computing How They Did It Brendan Dean Outsourced some of the architecture work. Software engineers warned of problems. Laid off call center employees before launch. CIO continued with launch despite warnings. 3.5 millions members were transferred from the legacy systems to the new system at one time. New call center employees were not trained enough.

CS 3043 Social Implications Of Computing Results Brendan Dean Customers could not get help over the phone. Some customers benefits did not get transferred. Internal  Restructuring of IT leadership  CIGNA now has better testing and checks in place External  Lost 6% of its health care membership  Contributed to 40% stock drop

CS 3043 Social Implications Of Computing © 2008 Keith A. Pray 11 5/3/2015 Risk What is it? Chance of it happening?  Random, Historical statistics, Analysis Give examples of risks with computer systems

CS 3043 Social Implications Of Computing © 2008 Keith A. Pray 12 5/3/2015 Predicting Risk What are the factors? Enough data to be statistically significant? Can you reduce or increase your own risk?  Chance  Severity

CS 3043 Social Implications Of Computing © 2008 Keith A. Pray 13 5/3/2015 Reliability Of Statistics Are other factors controlled? Is enough time covered? Is all data reported?

CS 3043 Social Implications Of Computing © 2008 Keith A. Pray 14 5/3/2015 Cost-Benefit Analysis How much does it cost? What do I get for this cost?

CS 3043 Social Implications Of Computing © 2008 Keith A. Pray 15 5/3/2015 Risk-Benefit Analysis What could go wrong? How likely is it? How costly are the consequences?

CS 3043 Social Implications Of Computing © 2008 Keith A. Pray 16 5/3/2015 Limitations to Risk-Benefit Analysis Hard to quantify probabilities Hard to quantify costs Who bears the costs? Are the potential benefits worth it?

CS 3043 Social Implications Of Computing © 2008 Keith A. Pray 17 5/3/2015 Some Measures Mean Time To Failure (MTTF) Mean Time Between Failures (MTBF) Mean Time To Repair (MTTR)

CS 3043 Social Implications Of Computing © 2008 Keith A. Pray 18 5/3/2015 Relying Too Much Limits of modeling reality Limits of precision Limits of algorithms Limits of interpretation

CS 3043 Social Implications Of Computing © 2008 Keith A. Pray 19 5/3/2015 Value of Intuition Are results reasonable?

CS 3043 Social Implications Of Computing © 2008 Keith A. Pray 20 5/3/2015 Producing Good Software Good specifications Good usability Good design Robustness Good implementation Testing

CS 3043 Social Implications Of Computing © 2008 Keith A. Pray 21 5/3/2015 Plan For The Long Term Version control Future development New platforms Patches Security Training Customer support

CS 3043 Social Implications Of Computing 5/3/2015© 2008 Keith A. Pray 22 Class 12 The End Keith A. Pray Instructor socialimps.keithpray.net