Presentation is loading. Please wait.

Presentation is loading. Please wait.

Completing a task relevant to cybersecurity Case 2

Similar presentations


Presentation on theme: "Completing a task relevant to cybersecurity Case 2"— Presentation transcript:

1 Completing a task relevant to cybersecurity Case 2
FORMAT of CLASSES Week 6  Week 10 Following the Format of the Final Exam Case 1 Technical Completing a task relevant to cybersecurity Case 2 Cybersecurity concept related to attacks or defense Case 3 Cybersecurity policy and strategy for an organization (small and midsize business)

2 Technical Case-1: Viewing, deleting, and interpreting cookies

3 Cyber Security Concept-1:BYOD risks and policies
BYOD policies define rules and regulations related to the use of personal devices (smartphones, laptops) by employees at work.

4

5 Topics of Research Based on today’s discussion
Risks created by BYOD (allowing employees to use their own devices at work) and strategies for mitigating these risks. The use of cookies in hacking attacks (cookie forging) Risks created by backing up data on the cloud and strategies for mitigating these risks. Topics based on discussions from last class Data breaches caused by human error Strategies for reducing human error in cybersecurity Deception and Physical Security: The use of deception to access unauthorized spaces Deception and Digital Security: The use of deception (phishing) to access unauthorized web spaces

6 Go to page 54 of the textbook
Define each type of partnership Pick one partnership that you would likely use in the organization where you work or where you plan to work

7 Find one online community that offers resources and information about cybersecurity
The online community should be from the Chapter

8 Cloud Security: How it works

9 Privacy of our data in the cloud and on databases
FBI Agents selling data to businesses Risks caused by unethical employees with privileged access to data

10 Does the weather affect mood?

11 Weather, time of the day, and other factors affect concentration and the tendency to make errors.
Reducing errors: Four Eyes Principle Checklists


Download ppt "Completing a task relevant to cybersecurity Case 2"

Similar presentations


Ads by Google