SlideShare uma empresa Scribd logo
1 de 81
4/11/2011  Information Security and Risk Management  in Context The Context Dr. Barbara Endicott-Popovsky
Center for Information Assurance  and Cybersecurity (NSA/DHS CAE-R) CIAC   The Center for Information  Assurance and Cybersecurity  at the University of Washington   ,[object Object],[object Object],[object Object],[object Object],http://ciac.ischool.washington.edu/
[object Object],[object Object],[object Object]
NSA/DHS NIETP Program: “ Growing” information security professionals in our universities
UW/West Coast  opportunity
Center for Information Assurance and  Cybersecurity NSA-CAE-R
Multi-Disciplined IA Approach Goal of System Policy Security Awareness Training Procedures & Practices Mechanisms Secure System IA Audit Feedback Business School—IT iSchool Evans School—Internet Center Law School—Shidler Center Business School—IT iSchool Evans School Law School Tech Comm-Eng iSchool Computer Science Elect Engr Business School—IT iSchool Tech Comm-Eng
Academics ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Research  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Pacific Northwest National Laboratory  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Center Contributors ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Academic Researchers Practitioner Researchers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Current Center Activities Funded Projects White Papers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Cyber Warrior: Effectively Defending  Cyberspace ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Welcome to Cybersecurity Island http://www.youtube.com/watch?v=fvYOaf-9n-o
Asset Protection Model ,[object Object],[object Object],[object Object]
IPSec Interoperability for  Boeing-led Working Group ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Trust along Supply Chain ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],APEA 2010
Securing the Future Innovative Integration ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Outreach ,[object Object],[object Object],[object Object],[object Object],[object Object]
Unintended Consequences  of the Information Age   ,[object Object],[object Object],[object Object],[object Object],http://www.uwtv.org/programs/displayseries.aspx?fid=2121
Pacific Rim Collegiate Cyber Defense Contest (PRCCDC)
Information Security Compliance and Risk Management Institute:  Where Information Technology, Law and    Risk Management Converge September 16-17, 2009 University of Washington UW Tower Auditorium Seattle, Washington http://www.engr.washington.edu/epp/infosec/index.php
CONTEXT: UNINTENDED CONSEQUENCES OF THE INFORMATION AGE ,[object Object]
Context Evolution Agricultural Age Industrial Age Information Age
Attribute Agricultural Age Industrial Age Information Age Wealth Land Capital Knowledge Advancement  Conquest Invention Paradigm Shifts Time Sun/Seasons Factory Whistle Time Zones Workplace Farm Capital equipment Networks Organization Structure Family Corporation Collaborations Tools Plow Machines Computers Problem-solving Self Delegation Integration Knowledge Generalized Specialized Interdisciplinary Learning Self-taught Classroom Online
Smashing Industrial Age Infrastructure!
And just whom do you think is going to clean up this mess, Noah?
THE PROBLEM ,[object Object]
Our Love Affair with the Internet Shoppers embrace the online model POSTED: 0727 GMT (1527 HKT), December 20, 2006  Embracing Internet Technologies  Baby Boomers Embracing Mobile Technology US Internet Users Embrace Digital Imaging Docs Embracing Internet
WORLD INTERNET USAGE AND POPULATION STATISTICS Internet Users Dec. 31, 2000 Internet Users Latest Data Penetration (% Population) Growth 2000-2010 Users % of Table Internet Users Dec. 31, 2000 4,514,400 110,931,700 10.9 % 2,357.3 % 5.6 % 4,514,400 114,304,000 825,094,396 21.5 % 621.8 % 42.0 % 114,304,000 105,096,093 475,069,448 58.4 % 352.0 % 24.2 % 105,096,093 3,284,800 63,240,946 29.8 % 1,825.3 % 3.2 % 3,284,800 108,096,800 266,224,500 77.4 % 146.3 % 13.5 % 108,096,800 18,068,919 204,689,836 34.5 % 1,032.8 % 10.4 % 18,068,919 7,620,480 21,263,990 61.3 % 179.0 % 1.1 % 7,620,480 360,985,492 1,966,514,816 28.7 % 444.8 % 100.0 % 360,985,492
 
 
                                                           
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . RESISTANCE IS FUTILE. PREPARE TO BE ASSIMULATED? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Species 8472   Courtesy: K. Bailey/E. Hayden, CISOs
Duality in Cyberspace Benign Malignant New Opportunities Efficiencies Convenience New  Crimes Privacy  Loss Threat Intrusion
http://www.engadget.com/2009/04/28/electronic-voting-outlawed-in-ireland-michael-flatley-dvds-okay/
http://artsbeat.blogs.nytimes.com/2009/07/31/judge-rules-student-is-liable-in-music-download-case/
http://www.scmagazineus.com/Majority-think-outsourcing-threatens-network-security/article/150955/
http://blogs.courant.com/rick_green/2008/11/connecticut-drops-felony-charg.html
Growing Threat Spectrum
“ If the Internet were a street, I wouldn’t walk it in daytime…” ,[object Object],[object Object],[object Object],[object Object],Courtesy: FBI, LE
Interdependence of Critical Infrastructure
We’re overwhelmed! Society is not keeping up!
 
A Metaphor…..
Fantasia
                                                                                                                                                 
                                                       
The Unintended Consequences
Security and Trust in VWs
Trouble in Paradise?
Evolution of Internet Threats
Griefers, Phishing, Hackers, oh my!
Set Your “Evil Bit”* to 1 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What is at risk? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Do you trust me?  Why?
Security and Trust in Virtual Worlds ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
User Agreements ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Side Channels:   Processes Outside of VW  ,[object Object],[object Object],[object Object],[object Object],[object Object]
Security Zones ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
VW Authentication ,[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],http://oddorama.com/2008/02/11/scamming-the-scammers-5-brilliant-419-reverse-scams/
What else?….
[object Object]
Where are the cybersecurity professionals?
If government predictions are right, health IT will create 50,000 new jobs in the future. The new jobs will be needed at all levels, from engineers to IT workers. People who have experience in the computer science and informatics fields will be especially attractive to potential employers, but the federal government will put some money toward training employees. Nurses could have the hardest time transitioning from paper to digital, but the training will help to close the informatics gap 50,000 Health IT Jobs Expected October 28, 2009 - 5:53pm
U.S. Faces Cyber Security Gap Without Training, Education March 24, 2010  By  Kenneth Corbin  WASHINGTON -- As discussions about the  federal approach to cyber security continue to percolate across the highest levels of government , one of the most important steps policymakers can take is to nourish the education and training of a new crop of  security  experts, a senior administration official said here at the  FOSE government IT show .  Working in concert with the government, the private sector has made significant strides in improving software security and ferreting out vulnerabilities in the supply chain, but  the flow of cyber security experts graduating from the nation's universities with advanced degrees remains anemic , according to Richard Marshall, the director of global cyber  security management  at the Department of Homeland Security.
Homeland Security to hire 1,000 cybersecurity experts By Michael Cooney October 1, 2009 01:42 PM ET Network World - The Department of Homeland Security wants to  hire  1,000 cybersecurity professionals in the next three years, according to agency Secretary Janet Napolitano. The department has the authority to recruit and hire cybersecurity professionals across DHS over the next three years in order to help fulfill its mission  to protect the nation’s cyber infrastructure, systems and networks , she said.
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],The Options  …
Not scalable! How do we accelerate preparation of professionals?
THE SOLUTION ,[object Object]
Global Competition Technologies &  Policies Professional & Social Trends Experts & Community / Business Leaders Potential: Students Researchers Educators Political  Environment Economy Outcomes: Professionals New    Knowledge New    Technology Ed. Products Ideology Culture Pedagogical  institute Model
Emerging Job Market ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Source:  Foote Partners http://www.footepartners.com/SSCP.htm
Global Competition Technologies &  Policies Professional & Social Trends Experts & Community / Business Leaders Potential: Students Researchers Educators Political  Environment Economy Outcomes: Professionals New    Knowledge New    Technology Ed. Products Ideology Culture Pedagogical  institute Model
Goals ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Content ,[object Object],[object Object],[object Object],Module 1 Module 2 Module 3 Module 4 Module 5
Teachers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Teachers (Cont’d.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
RESULTS ,[object Object]
Sample success stories ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Unintended Consequences of Embracing the Internet…..

Mais conteúdo relacionado

Mais procurados

The DETER Project: Advancing the Science of Cyber Security Experimentation an...
The DETER Project: Advancing the Science of Cyber Security Experimentation an...The DETER Project: Advancing the Science of Cyber Security Experimentation an...
The DETER Project: Advancing the Science of Cyber Security Experimentation an...DETER-Project
 
The Science of Cyber Security Experimentation: The DETER Project
The Science of Cyber Security Experimentation: The DETER ProjectThe Science of Cyber Security Experimentation: The DETER Project
The Science of Cyber Security Experimentation: The DETER ProjectDETER-Project
 
The DETER Project: Towards Structural Advances in Experimental Cybersecurity ...
The DETER Project: Towards Structural Advances in Experimental Cybersecurity ...The DETER Project: Towards Structural Advances in Experimental Cybersecurity ...
The DETER Project: Towards Structural Advances in Experimental Cybersecurity ...DETER-Project
 
Anomaly Threat Detection System using User and Role-Based Profile Assessment
Anomaly Threat Detection System using User and Role-Based Profile AssessmentAnomaly Threat Detection System using User and Role-Based Profile Assessment
Anomaly Threat Detection System using User and Role-Based Profile Assessmentijtsrd
 
Deterring hacking strategies via
Deterring hacking strategies viaDeterring hacking strategies via
Deterring hacking strategies viaIJNSA Journal
 
Evaluation of enhanced security solutions in
Evaluation of enhanced security solutions inEvaluation of enhanced security solutions in
Evaluation of enhanced security solutions inIJNSA Journal
 
IRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed Servers
IRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed ServersIRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed Servers
IRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed ServersIRJET Journal
 
Data-Driven Assessment of Cyber Risk: Challenges in Assessing and Migrating C...
Data-Driven Assessment of Cyber Risk: Challenges in Assessing and Migrating C...Data-Driven Assessment of Cyber Risk: Challenges in Assessing and Migrating C...
Data-Driven Assessment of Cyber Risk: Challenges in Assessing and Migrating C...Cybersecurity Education and Research Centre
 
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?SahilRao25
 
OA_Cyber security course with AI
OA_Cyber security course with AIOA_Cyber security course with AI
OA_Cyber security course with AIObject Automation
 
Jain_Navya_resume
Jain_Navya_resumeJain_Navya_resume
Jain_Navya_resumeNavya Jain
 
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017Maurice Dawson
 
The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and...
The Malicious Use   of Artificial Intelligence: Forecasting, Prevention,  and...The Malicious Use   of Artificial Intelligence: Forecasting, Prevention,  and...
The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and...Willy Marroquin (WillyDevNET)
 
System Dynamics Based Insider Threats Modeling
System Dynamics Based Insider Threats ModelingSystem Dynamics Based Insider Threats Modeling
System Dynamics Based Insider Threats ModelingIJNSA Journal
 
IJSRED-V2I5P43
IJSRED-V2I5P43IJSRED-V2I5P43
IJSRED-V2I5P43IJSRED
 

Mais procurados (20)

Dr. Charles Pak
Dr. Charles PakDr. Charles Pak
Dr. Charles Pak
 
Alloy Cybersecurity
Alloy CybersecurityAlloy Cybersecurity
Alloy Cybersecurity
 
The DETER Project: Advancing the Science of Cyber Security Experimentation an...
The DETER Project: Advancing the Science of Cyber Security Experimentation an...The DETER Project: Advancing the Science of Cyber Security Experimentation an...
The DETER Project: Advancing the Science of Cyber Security Experimentation an...
 
The Science of Cyber Security Experimentation: The DETER Project
The Science of Cyber Security Experimentation: The DETER ProjectThe Science of Cyber Security Experimentation: The DETER Project
The Science of Cyber Security Experimentation: The DETER Project
 
The DETER Project: Towards Structural Advances in Experimental Cybersecurity ...
The DETER Project: Towards Structural Advances in Experimental Cybersecurity ...The DETER Project: Towards Structural Advances in Experimental Cybersecurity ...
The DETER Project: Towards Structural Advances in Experimental Cybersecurity ...
 
Anomaly Threat Detection System using User and Role-Based Profile Assessment
Anomaly Threat Detection System using User and Role-Based Profile AssessmentAnomaly Threat Detection System using User and Role-Based Profile Assessment
Anomaly Threat Detection System using User and Role-Based Profile Assessment
 
Modern Metrics on Computer Networking
Modern Metrics on Computer NetworkingModern Metrics on Computer Networking
Modern Metrics on Computer Networking
 
Deterring hacking strategies via
Deterring hacking strategies viaDeterring hacking strategies via
Deterring hacking strategies via
 
Evaluation of enhanced security solutions in
Evaluation of enhanced security solutions inEvaluation of enhanced security solutions in
Evaluation of enhanced security solutions in
 
IRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed Servers
IRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed ServersIRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed Servers
IRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed Servers
 
Forensics
ForensicsForensics
Forensics
 
Data-Driven Assessment of Cyber Risk: Challenges in Assessing and Migrating C...
Data-Driven Assessment of Cyber Risk: Challenges in Assessing and Migrating C...Data-Driven Assessment of Cyber Risk: Challenges in Assessing and Migrating C...
Data-Driven Assessment of Cyber Risk: Challenges in Assessing and Migrating C...
 
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
 
OA_Cyber security course with AI
OA_Cyber security course with AIOA_Cyber security course with AI
OA_Cyber security course with AI
 
Jain_Navya_resume
Jain_Navya_resumeJain_Navya_resume
Jain_Navya_resume
 
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
 
Butler
ButlerButler
Butler
 
The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and...
The Malicious Use   of Artificial Intelligence: Forecasting, Prevention,  and...The Malicious Use   of Artificial Intelligence: Forecasting, Prevention,  and...
The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and...
 
System Dynamics Based Insider Threats Modeling
System Dynamics Based Insider Threats ModelingSystem Dynamics Based Insider Threats Modeling
System Dynamics Based Insider Threats Modeling
 
IJSRED-V2I5P43
IJSRED-V2I5P43IJSRED-V2I5P43
IJSRED-V2I5P43
 

Destaque

Introduction to Internet
Introduction to InternetIntroduction to Internet
Introduction to InternetMiguel Rebollo
 
Introduction to Information Technology (IT)
Introduction to Information Technology (IT)Introduction to Information Technology (IT)
Introduction to Information Technology (IT)Amber Bhaumik
 
Business process reengineering
Business process reengineeringBusiness process reengineering
Business process reengineeringNeelkamal Sharma
 
Introduction to information technology lecture 1
Introduction to information technology lecture 1Introduction to information technology lecture 1
Introduction to information technology lecture 1adpafit
 
Introduction to information technology lecture 1
Introduction to information technology   lecture 1Introduction to information technology   lecture 1
Introduction to information technology lecture 1CBAKhan
 
The Internet Presentation
The Internet Presentation The Internet Presentation
The Internet Presentation guest9e3d59
 

Destaque (6)

Introduction to Internet
Introduction to InternetIntroduction to Internet
Introduction to Internet
 
Introduction to Information Technology (IT)
Introduction to Information Technology (IT)Introduction to Information Technology (IT)
Introduction to Information Technology (IT)
 
Business process reengineering
Business process reengineeringBusiness process reengineering
Business process reengineering
 
Introduction to information technology lecture 1
Introduction to information technology lecture 1Introduction to information technology lecture 1
Introduction to information technology lecture 1
 
Introduction to information technology lecture 1
Introduction to information technology   lecture 1Introduction to information technology   lecture 1
Introduction to information technology lecture 1
 
The Internet Presentation
The Internet Presentation The Internet Presentation
The Internet Presentation
 

Semelhante a 2011 lecture ia orientation

PEARC17: ARCC Identity and Access Management, Security and related topics. Cy...
PEARC17: ARCC Identity and Access Management, Security and related topics. Cy...PEARC17: ARCC Identity and Access Management, Security and related topics. Cy...
PEARC17: ARCC Identity and Access Management, Security and related topics. Cy...Florence Hudson
 
Hakin9 interview w Prof Sood
Hakin9 interview w Prof SoodHakin9 interview w Prof Sood
Hakin9 interview w Prof SoodZsolt Nemeth
 
Cyber Security_Presentation_KTH
Cyber Security_Presentation_KTHCyber Security_Presentation_KTH
Cyber Security_Presentation_KTHAwais Shibli
 
Insider threatsystemdynamics 2
Insider threatsystemdynamics 2Insider threatsystemdynamics 2
Insider threatsystemdynamics 2Fred Kautz
 
Chris Dabo Resume 20160915
Chris Dabo Resume 20160915Chris Dabo Resume 20160915
Chris Dabo Resume 20160915Christopher Dabo
 
Donna Schmidt Resume
Donna Schmidt ResumeDonna Schmidt Resume
Donna Schmidt ResumeDonna Robeck
 
Solnet dev secops meetup
Solnet dev secops meetupSolnet dev secops meetup
Solnet dev secops meetuppbink
 
CIS505008VA0- COMMUNICATION TECHNOLOGIESWeek 2 Assignment 1 Su.docx
CIS505008VA0- COMMUNICATION TECHNOLOGIESWeek 2 Assignment 1 Su.docxCIS505008VA0- COMMUNICATION TECHNOLOGIESWeek 2 Assignment 1 Su.docx
CIS505008VA0- COMMUNICATION TECHNOLOGIESWeek 2 Assignment 1 Su.docxsleeperharwell
 
Lessons Learned From Heartbleed, Struts, and The Neglected 90%
Lessons Learned From Heartbleed, Struts, and The Neglected 90%Lessons Learned From Heartbleed, Struts, and The Neglected 90%
Lessons Learned From Heartbleed, Struts, and The Neglected 90%Sonatype
 
CISSP Certification Training Course
CISSP Certification Training CourseCISSP Certification Training Course
CISSP Certification Training CourseRicky Lionel Vaz
 
Cybersecurity for Science
Cybersecurity for ScienceCybersecurity for Science
Cybersecurity for ScienceVon Welch
 
AnnaVysotskayaCybersecResume2
AnnaVysotskayaCybersecResume2AnnaVysotskayaCybersecResume2
AnnaVysotskayaCybersecResume2Anna Vysotskaya
 
Data mining in security: Ja'far Alqatawna
Data mining in security: Ja'far AlqatawnaData mining in security: Ja'far Alqatawna
Data mining in security: Ja'far AlqatawnaMaribel García Arenas
 

Semelhante a 2011 lecture ia orientation (20)

PEARC17: ARCC Identity and Access Management, Security and related topics. Cy...
PEARC17: ARCC Identity and Access Management, Security and related topics. Cy...PEARC17: ARCC Identity and Access Management, Security and related topics. Cy...
PEARC17: ARCC Identity and Access Management, Security and related topics. Cy...
 
Hakin9 interview w Prof Sood
Hakin9 interview w Prof SoodHakin9 interview w Prof Sood
Hakin9 interview w Prof Sood
 
ConnieJusticeCV-2016
ConnieJusticeCV-2016ConnieJusticeCV-2016
ConnieJusticeCV-2016
 
Cyber Security_Presentation_KTH
Cyber Security_Presentation_KTHCyber Security_Presentation_KTH
Cyber Security_Presentation_KTH
 
Recent trends in cloud computing articles
Recent trends in cloud computing articlesRecent trends in cloud computing articles
Recent trends in cloud computing articles
 
Jenkins_ Carlasha 2016 v1
Jenkins_ Carlasha 2016 v1Jenkins_ Carlasha 2016 v1
Jenkins_ Carlasha 2016 v1
 
Insider threatsystemdynamics 2
Insider threatsystemdynamics 2Insider threatsystemdynamics 2
Insider threatsystemdynamics 2
 
Information security presentation
Information security presentationInformation security presentation
Information security presentation
 
Chris Dabo Resume 20160915
Chris Dabo Resume 20160915Chris Dabo Resume 20160915
Chris Dabo Resume 20160915
 
Donna Schmidt Resume
Donna Schmidt ResumeDonna Schmidt Resume
Donna Schmidt Resume
 
Solnet dev secops meetup
Solnet dev secops meetupSolnet dev secops meetup
Solnet dev secops meetup
 
CIS505008VA0- COMMUNICATION TECHNOLOGIESWeek 2 Assignment 1 Su.docx
CIS505008VA0- COMMUNICATION TECHNOLOGIESWeek 2 Assignment 1 Su.docxCIS505008VA0- COMMUNICATION TECHNOLOGIESWeek 2 Assignment 1 Su.docx
CIS505008VA0- COMMUNICATION TECHNOLOGIESWeek 2 Assignment 1 Su.docx
 
Lessons Learned From Heartbleed, Struts, and The Neglected 90%
Lessons Learned From Heartbleed, Struts, and The Neglected 90%Lessons Learned From Heartbleed, Struts, and The Neglected 90%
Lessons Learned From Heartbleed, Struts, and The Neglected 90%
 
weaver_resume2
weaver_resume2weaver_resume2
weaver_resume2
 
CISSP Certification Training Course
CISSP Certification Training CourseCISSP Certification Training Course
CISSP Certification Training Course
 
Cybersecurity for Science
Cybersecurity for ScienceCybersecurity for Science
Cybersecurity for Science
 
AnnaVysotskayaCybersecResume2
AnnaVysotskayaCybersecResume2AnnaVysotskayaCybersecResume2
AnnaVysotskayaCybersecResume2
 
Data mining in security: Ja'far Alqatawna
Data mining in security: Ja'far AlqatawnaData mining in security: Ja'far Alqatawna
Data mining in security: Ja'far Alqatawna
 
Web profile
Web profileWeb profile
Web profile
 
Web profile
Web profileWeb profile
Web profile
 

Último

Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxAmita Gupta
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 

Último (20)

Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 

2011 lecture ia orientation

Notas do Editor

  1. Expect to see a similar evolution within Virtual Worlds to that on the rest of the internet – attacks will become monetized
  2. Evolution of threats on the Internet – we can expect to see the same evolution in Virtual worlds.
  3. The nutshell: a fake pastor from Nigeria tries to con a stranger out of money only to end up with a horrific tattoo instead. In a supposed bid for financial assistance to help Pakistani earthquake survivors this scammer tried to trick the wrong individual. The scambusters write back that he could have up to $150,000 if only he were a member of the church. The scammer bites, of course, and is told that he’ll simply have to get a tattoo showing his devotion to the church. Sure enough, he gets the tattoo and sends pictures! At this point things get strange: the scambusters fake being another scammer who has hacked into the good church’s email system. They finally get the scammer to “work for them” and admit what he is doing. Before it is finished, the scambusters have the name and address of the scammer and leave him waiting (forever) for his funds).