SlideShare uma empresa Scribd logo
1 de 5
Weekend MBA Webinar Information Security Sanjay Goel School of Business University at Albany, SUNY March 16, 2011
[object Object],[object Object],[object Object],Information A Key Organizational Asset  Source:  O’Reilly Volume Content Organization Time Content Growth 1990 London Library (500,000 volumes) 3000 BC Earliest  written  record 500 Monks copy books by hand 1450 Gutenberg’s hand press 1884 For mechanical typesetter 1480 Vatican library (3500 volumes) 1992  Internet explosion 1994 Internet  Architects 1970 SGML 1876 Dewey Decimal System 330 BC Alexandria Library  bibliography 660 BC Assyrian king tablets by subject
Information Security Largest Data Breaches Based on:   Attrition Data Loss Archive and Database, FlowingData March 03  June 04  June 05  May 06  Jan. 07  Mar. 07  July 07  Sept. 07  Nov. 07  Feb. 08 Visa, MasterCard, and American Express 40 million June 19, 2005 TJX Companies, Inc. 94 million January 17, 2007 U.S. Department of Veteran Affairs 26.5 million May 22, 2006 Dai Nippon Printing Company 8.6 million March 12, 2007 Data Processors International   5 million March 6, 2003 Citigroup 30 million June 6, 2005 America Online 30 million June 24, 2004 Fidelity National Information Services 8.5 million July 3, 2007 TD Ameritrade 6.3 million Sept. 14, 2007 HM Revenue  and Customs 25 million Nov. 20, 2007 Bank of NY  Mellon 12.5 million Feb. 27, 2008
Information Security Crimes are Same Avenues Have Changed
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Image Source:   http://www.hometips.com/catimages/011810_home_security.jpg Information Security How to Protect?

Mais conteúdo relacionado

Destaque

Information Security Management 101
Information Security Management 101Information Security Management 101
Information Security Management 101Jerod Brennen
 
23 network security threats pkg
23 network security threats pkg23 network security threats pkg
23 network security threats pkgUmang Gupta
 
MIS: Information Security Management
MIS: Information Security ManagementMIS: Information Security Management
MIS: Information Security ManagementJonathan Coleman
 
Building Up Network Security: An Introduction
Building Up Network Security: An Introduction Building Up Network Security: An Introduction
Building Up Network Security: An Introduction Global Knowledge Training
 
Information Systems Policy
Information Systems PolicyInformation Systems Policy
Information Systems PolicyAli Sadhik Shaik
 
Project report titles for mba in information technology (it)
Project report titles for mba in information technology (it)Project report titles for mba in information technology (it)
Project report titles for mba in information technology (it)mbaprojectconsultacy2014
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information SecurityDr. Loganathan R
 
Information Security Management System ISO/IEC 27001:2005
Information Security Management System ISO/IEC 27001:2005Information Security Management System ISO/IEC 27001:2005
Information Security Management System ISO/IEC 27001:2005ControlCase
 
Information security management
Information security managementInformation security management
Information security managementUMaine
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingDaniel P Wallace
 
Information Security Lecture #1 ppt
Information Security Lecture #1 pptInformation Security Lecture #1 ppt
Information Security Lecture #1 pptvasanthimuniasamy
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security PresentationAllan Pratt MBA
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITYAhmed Moussa
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and SolutionsColin058
 
NetworkSecurity.ppt
NetworkSecurity.pptNetworkSecurity.ppt
NetworkSecurity.pptDreamMalar
 

Destaque (20)

Information security
Information securityInformation security
Information security
 
Information Security for Small Business
Information Security for Small BusinessInformation Security for Small Business
Information Security for Small Business
 
Information security
Information securityInformation security
Information security
 
Information Security Management 101
Information Security Management 101Information Security Management 101
Information Security Management 101
 
23 network security threats pkg
23 network security threats pkg23 network security threats pkg
23 network security threats pkg
 
MIS: Information Security Management
MIS: Information Security ManagementMIS: Information Security Management
MIS: Information Security Management
 
Building Up Network Security: An Introduction
Building Up Network Security: An Introduction Building Up Network Security: An Introduction
Building Up Network Security: An Introduction
 
Information Systems Policy
Information Systems PolicyInformation Systems Policy
Information Systems Policy
 
Project report titles for mba in information technology (it)
Project report titles for mba in information technology (it)Project report titles for mba in information technology (it)
Project report titles for mba in information technology (it)
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
 
Information Security Management System ISO/IEC 27001:2005
Information Security Management System ISO/IEC 27001:2005Information Security Management System ISO/IEC 27001:2005
Information Security Management System ISO/IEC 27001:2005
 
Information security management
Information security managementInformation security management
Information security management
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Network security
Network security Network security
Network security
 
Information Security Lecture #1 ppt
Information Security Lecture #1 pptInformation Security Lecture #1 ppt
Information Security Lecture #1 ppt
 
Network security
Network securityNetwork security
Network security
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 
NetworkSecurity.ppt
NetworkSecurity.pptNetworkSecurity.ppt
NetworkSecurity.ppt
 

Semelhante a Information Security Webinar University at Albany MBA Education

SWOT of Bigdata Security Using Machine Learning Techniques
SWOT of Bigdata Security Using Machine Learning TechniquesSWOT of Bigdata Security Using Machine Learning Techniques
SWOT of Bigdata Security Using Machine Learning Techniquesijistjournal
 
Introduction to Data Science 5-13.pptx
Introduction to Data Science 5-13.pptxIntroduction to Data Science 5-13.pptx
Introduction to Data Science 5-13.pptxNilesh Raj
 
Data Science Innovations : Democratisation of Data and Data Science
Data Science Innovations : Democratisation of Data and Data Science  Data Science Innovations : Democratisation of Data and Data Science
Data Science Innovations : Democratisation of Data and Data Science suresh sood
 
Opportunities in Data Science.ppt
Opportunities in Data Science.pptOpportunities in Data Science.ppt
Opportunities in Data Science.pptSwapnilTelrandhe1
 
KM2.0: Knowledge, Creativity and Innovation
KM2.0: Knowledge, Creativity and InnovationKM2.0: Knowledge, Creativity and Innovation
KM2.0: Knowledge, Creativity and InnovationMYRA School of Business
 
Privacy in the Age of Big Data: Exploring the Role of Modern Identity Managem...
Privacy in the Age of Big Data: Exploring the Role of Modern Identity Managem...Privacy in the Age of Big Data: Exploring the Role of Modern Identity Managem...
Privacy in the Age of Big Data: Exploring the Role of Modern Identity Managem...Arab Federation for Digital Economy
 
A Short History of Big Data
A Short History of Big DataA Short History of Big Data
A Short History of Big DataGadi Eichhorn
 
Misra, D.C.(2009) Knowledge Management For E Government IIPA New Delhi 10.7.09
Misra, D.C.(2009) Knowledge Management For E Government IIPA New Delhi 10.7.09Misra, D.C.(2009) Knowledge Management For E Government IIPA New Delhi 10.7.09
Misra, D.C.(2009) Knowledge Management For E Government IIPA New Delhi 10.7.09Dr D.C. Misra
 
Crowdsourcing and the NIST Digital Archives: Using the 'crowd' to describe NI...
Crowdsourcing and the NIST Digital Archives: Using the 'crowd' to describe NI...Crowdsourcing and the NIST Digital Archives: Using the 'crowd' to describe NI...
Crowdsourcing and the NIST Digital Archives: Using the 'crowd' to describe NI...Andrea Medina-Smith
 
Jason Witty, SVP & CISO at US Bank - Next eneration information security meet...
Jason Witty, SVP & CISO at US Bank - Next eneration information security meet...Jason Witty, SVP & CISO at US Bank - Next eneration information security meet...
Jason Witty, SVP & CISO at US Bank - Next eneration information security meet...Global Business Events
 
The art and science of data-driven journalism
The art and science of data-driven journalism The art and science of data-driven journalism
The art and science of data-driven journalism Alexander Howard
 
Introduction to Data Science 5-13.pptx
Introduction to Data Science 5-13.pptxIntroduction to Data Science 5-13.pptx
Introduction to Data Science 5-13.pptxdevakisharma1
 
BigData & Supply Chain: A "Small" Introduction
BigData & Supply Chain: A "Small" IntroductionBigData & Supply Chain: A "Small" Introduction
BigData & Supply Chain: A "Small" IntroductionIvan Gruer
 
Rasetti fondazioneisi 29_06_2015
Rasetti fondazioneisi 29_06_2015Rasetti fondazioneisi 29_06_2015
Rasetti fondazioneisi 29_06_2015CSI Piemonte
 
Tech Topic Privacy
Tech Topic PrivacyTech Topic Privacy
Tech Topic Privacynetapprad
 
From AI to Z: How AI is changing the relationship between people and data
From AI to Z: How AI is changing the relationship between people and dataFrom AI to Z: How AI is changing the relationship between people and data
From AI to Z: How AI is changing the relationship between people and dataiGenius
 

Semelhante a Information Security Webinar University at Albany MBA Education (20)

SWOT of Bigdata Security Using Machine Learning Techniques
SWOT of Bigdata Security Using Machine Learning TechniquesSWOT of Bigdata Security Using Machine Learning Techniques
SWOT of Bigdata Security Using Machine Learning Techniques
 
Connect X
Connect X Connect X
Connect X
 
Introduction to Data Science 5-13.pptx
Introduction to Data Science 5-13.pptxIntroduction to Data Science 5-13.pptx
Introduction to Data Science 5-13.pptx
 
Data Science Innovations : Democratisation of Data and Data Science
Data Science Innovations : Democratisation of Data and Data Science  Data Science Innovations : Democratisation of Data and Data Science
Data Science Innovations : Democratisation of Data and Data Science
 
Opportunities in Data Science.ppt
Opportunities in Data Science.pptOpportunities in Data Science.ppt
Opportunities in Data Science.ppt
 
KM2.0: Knowledge, Creativity and Innovation
KM2.0: Knowledge, Creativity and InnovationKM2.0: Knowledge, Creativity and Innovation
KM2.0: Knowledge, Creativity and Innovation
 
Privacy in the Age of Big Data: Exploring the Role of Modern Identity Managem...
Privacy in the Age of Big Data: Exploring the Role of Modern Identity Managem...Privacy in the Age of Big Data: Exploring the Role of Modern Identity Managem...
Privacy in the Age of Big Data: Exploring the Role of Modern Identity Managem...
 
Big Data 101
Big Data 101Big Data 101
Big Data 101
 
A Short History of Big Data
A Short History of Big DataA Short History of Big Data
A Short History of Big Data
 
Misra, D.C.(2009) Knowledge Management For E Government IIPA New Delhi 10.7.09
Misra, D.C.(2009) Knowledge Management For E Government IIPA New Delhi 10.7.09Misra, D.C.(2009) Knowledge Management For E Government IIPA New Delhi 10.7.09
Misra, D.C.(2009) Knowledge Management For E Government IIPA New Delhi 10.7.09
 
Crowdsourcing and the NIST Digital Archives: Using the 'crowd' to describe NI...
Crowdsourcing and the NIST Digital Archives: Using the 'crowd' to describe NI...Crowdsourcing and the NIST Digital Archives: Using the 'crowd' to describe NI...
Crowdsourcing and the NIST Digital Archives: Using the 'crowd' to describe NI...
 
Jason Witty, SVP & CISO at US Bank - Next eneration information security meet...
Jason Witty, SVP & CISO at US Bank - Next eneration information security meet...Jason Witty, SVP & CISO at US Bank - Next eneration information security meet...
Jason Witty, SVP & CISO at US Bank - Next eneration information security meet...
 
The art and science of data-driven journalism
The art and science of data-driven journalism The art and science of data-driven journalism
The art and science of data-driven journalism
 
Data journalism Overview
Data journalism OverviewData journalism Overview
Data journalism Overview
 
Introduction to Data Science 5-13.pptx
Introduction to Data Science 5-13.pptxIntroduction to Data Science 5-13.pptx
Introduction to Data Science 5-13.pptx
 
Towards a More Open World
Towards a More Open WorldTowards a More Open World
Towards a More Open World
 
BigData & Supply Chain: A "Small" Introduction
BigData & Supply Chain: A "Small" IntroductionBigData & Supply Chain: A "Small" Introduction
BigData & Supply Chain: A "Small" Introduction
 
Rasetti fondazioneisi 29_06_2015
Rasetti fondazioneisi 29_06_2015Rasetti fondazioneisi 29_06_2015
Rasetti fondazioneisi 29_06_2015
 
Tech Topic Privacy
Tech Topic PrivacyTech Topic Privacy
Tech Topic Privacy
 
From AI to Z: How AI is changing the relationship between people and data
From AI to Z: How AI is changing the relationship between people and dataFrom AI to Z: How AI is changing the relationship between people and data
From AI to Z: How AI is changing the relationship between people and data
 

Mais de Donald G. Purdy, M.A.

UAlbany Weekend MBA Stories - Dennis Walsh
UAlbany Weekend MBA Stories - Dennis WalshUAlbany Weekend MBA Stories - Dennis Walsh
UAlbany Weekend MBA Stories - Dennis WalshDonald G. Purdy, M.A.
 
UAlbany Weekend MBA Stories - Tim Dunn
UAlbany Weekend MBA Stories - Tim DunnUAlbany Weekend MBA Stories - Tim Dunn
UAlbany Weekend MBA Stories - Tim DunnDonald G. Purdy, M.A.
 
UAlbany Weekend MBA Stories - Sharmaine Moseley
UAlbany Weekend MBA Stories - Sharmaine MoseleyUAlbany Weekend MBA Stories - Sharmaine Moseley
UAlbany Weekend MBA Stories - Sharmaine MoseleyDonald G. Purdy, M.A.
 
UAlbany Weekend MBA Stories - Flaiyh Alanazi
UAlbany Weekend MBA Stories - Flaiyh AlanaziUAlbany Weekend MBA Stories - Flaiyh Alanazi
UAlbany Weekend MBA Stories - Flaiyh AlanaziDonald G. Purdy, M.A.
 
University at Albany Weekend MBA West Point Career Fair Ad
University at Albany Weekend MBA West Point Career Fair AdUniversity at Albany Weekend MBA West Point Career Fair Ad
University at Albany Weekend MBA West Point Career Fair AdDonald G. Purdy, M.A.
 
Hugh Johnson UAlbany MBA Presentation
Hugh Johnson UAlbany MBA PresentationHugh Johnson UAlbany MBA Presentation
Hugh Johnson UAlbany MBA PresentationDonald G. Purdy, M.A.
 
UAlbany Weekend MBA Students Study Abroad
UAlbany Weekend MBA Students Study AbroadUAlbany Weekend MBA Students Study Abroad
UAlbany Weekend MBA Students Study AbroadDonald G. Purdy, M.A.
 
UAlbany Weekend MBA Program's Impact on Kim Phelan is Far Reaching!
UAlbany Weekend MBA Program's Impact on Kim Phelan is Far Reaching!UAlbany Weekend MBA Program's Impact on Kim Phelan is Far Reaching!
UAlbany Weekend MBA Program's Impact on Kim Phelan is Far Reaching!Donald G. Purdy, M.A.
 
UAlbany Weekend MBA Program Changes Cailin Purcell's Life!
UAlbany Weekend MBA Program Changes Cailin Purcell's Life!UAlbany Weekend MBA Program Changes Cailin Purcell's Life!
UAlbany Weekend MBA Program Changes Cailin Purcell's Life!Donald G. Purdy, M.A.
 
University at Albany Weekend MBA Information Session Presentation
University at Albany Weekend MBA Information Session PresentationUniversity at Albany Weekend MBA Information Session Presentation
University at Albany Weekend MBA Information Session PresentationDonald G. Purdy, M.A.
 
UAlbany Weekend MBA Rensselaer Train Station Advertising
UAlbany Weekend MBA Rensselaer Train Station AdvertisingUAlbany Weekend MBA Rensselaer Train Station Advertising
UAlbany Weekend MBA Rensselaer Train Station AdvertisingDonald G. Purdy, M.A.
 
UAlbany Weekend MBA Time to Get Your Career on Track Ad-March/April 2013 Arri...
UAlbany Weekend MBA Time to Get Your Career on Track Ad-March/April 2013 Arri...UAlbany Weekend MBA Time to Get Your Career on Track Ad-March/April 2013 Arri...
UAlbany Weekend MBA Time to Get Your Career on Track Ad-March/April 2013 Arri...Donald G. Purdy, M.A.
 
UAlbany Weekend MBA Stories - Gautam Chatterji
UAlbany Weekend MBA Stories - Gautam ChatterjiUAlbany Weekend MBA Stories - Gautam Chatterji
UAlbany Weekend MBA Stories - Gautam ChatterjiDonald G. Purdy, M.A.
 
UAlbany Weekend MBA Is It Time to Get Ahead in Your Career Ad-January/Februar...
UAlbany Weekend MBA Is It Time to Get Ahead in Your Career Ad-January/Februar...UAlbany Weekend MBA Is It Time to Get Ahead in Your Career Ad-January/Februar...
UAlbany Weekend MBA Is It Time to Get Ahead in Your Career Ad-January/Februar...Donald G. Purdy, M.A.
 

Mais de Donald G. Purdy, M.A. (20)

UAlbany Weekend MBA Stories - Dennis Walsh
UAlbany Weekend MBA Stories - Dennis WalshUAlbany Weekend MBA Stories - Dennis Walsh
UAlbany Weekend MBA Stories - Dennis Walsh
 
UAlbany Weekend MBA Stories - Tim Dunn
UAlbany Weekend MBA Stories - Tim DunnUAlbany Weekend MBA Stories - Tim Dunn
UAlbany Weekend MBA Stories - Tim Dunn
 
UAlbany Weekend MBA Stories - Sharmaine Moseley
UAlbany Weekend MBA Stories - Sharmaine MoseleyUAlbany Weekend MBA Stories - Sharmaine Moseley
UAlbany Weekend MBA Stories - Sharmaine Moseley
 
UAlbany Weekend MBA Stories - Flaiyh Alanazi
UAlbany Weekend MBA Stories - Flaiyh AlanaziUAlbany Weekend MBA Stories - Flaiyh Alanazi
UAlbany Weekend MBA Stories - Flaiyh Alanazi
 
University at Albany Weekend MBA West Point Career Fair Ad
University at Albany Weekend MBA West Point Career Fair AdUniversity at Albany Weekend MBA West Point Career Fair Ad
University at Albany Weekend MBA West Point Career Fair Ad
 
Fjallraven Polar Presentation
Fjallraven Polar PresentationFjallraven Polar Presentation
Fjallraven Polar Presentation
 
Hugh Johnson UAlbany MBA Presentation
Hugh Johnson UAlbany MBA PresentationHugh Johnson UAlbany MBA Presentation
Hugh Johnson UAlbany MBA Presentation
 
UAlbany Weekend MBA Students Study Abroad
UAlbany Weekend MBA Students Study AbroadUAlbany Weekend MBA Students Study Abroad
UAlbany Weekend MBA Students Study Abroad
 
Smart Moves - Laura Nesbit, CPA
Smart Moves - Laura Nesbit, CPASmart Moves - Laura Nesbit, CPA
Smart Moves - Laura Nesbit, CPA
 
UAlbany Weekend MBA Program's Impact on Kim Phelan is Far Reaching!
UAlbany Weekend MBA Program's Impact on Kim Phelan is Far Reaching!UAlbany Weekend MBA Program's Impact on Kim Phelan is Far Reaching!
UAlbany Weekend MBA Program's Impact on Kim Phelan is Far Reaching!
 
Innovation - What is It?
Innovation - What is It?Innovation - What is It?
Innovation - What is It?
 
UAlbany Weekend MBA Program Changes Cailin Purcell's Life!
UAlbany Weekend MBA Program Changes Cailin Purcell's Life!UAlbany Weekend MBA Program Changes Cailin Purcell's Life!
UAlbany Weekend MBA Program Changes Cailin Purcell's Life!
 
Smart Moves - Rob Farrell
Smart Moves - Rob FarrellSmart Moves - Rob Farrell
Smart Moves - Rob Farrell
 
University at Albany Weekend MBA Information Session Presentation
University at Albany Weekend MBA Information Session PresentationUniversity at Albany Weekend MBA Information Session Presentation
University at Albany Weekend MBA Information Session Presentation
 
Smart Moves - Evan Spinosa
Smart Moves - Evan SpinosaSmart Moves - Evan Spinosa
Smart Moves - Evan Spinosa
 
Smart Moves - Joe DeConno
Smart Moves - Joe DeConnoSmart Moves - Joe DeConno
Smart Moves - Joe DeConno
 
UAlbany Weekend MBA Rensselaer Train Station Advertising
UAlbany Weekend MBA Rensselaer Train Station AdvertisingUAlbany Weekend MBA Rensselaer Train Station Advertising
UAlbany Weekend MBA Rensselaer Train Station Advertising
 
UAlbany Weekend MBA Time to Get Your Career on Track Ad-March/April 2013 Arri...
UAlbany Weekend MBA Time to Get Your Career on Track Ad-March/April 2013 Arri...UAlbany Weekend MBA Time to Get Your Career on Track Ad-March/April 2013 Arri...
UAlbany Weekend MBA Time to Get Your Career on Track Ad-March/April 2013 Arri...
 
UAlbany Weekend MBA Stories - Gautam Chatterji
UAlbany Weekend MBA Stories - Gautam ChatterjiUAlbany Weekend MBA Stories - Gautam Chatterji
UAlbany Weekend MBA Stories - Gautam Chatterji
 
UAlbany Weekend MBA Is It Time to Get Ahead in Your Career Ad-January/Februar...
UAlbany Weekend MBA Is It Time to Get Ahead in Your Career Ad-January/Februar...UAlbany Weekend MBA Is It Time to Get Ahead in Your Career Ad-January/Februar...
UAlbany Weekend MBA Is It Time to Get Ahead in Your Career Ad-January/Februar...
 

Information Security Webinar University at Albany MBA Education

  • 1. Weekend MBA Webinar Information Security Sanjay Goel School of Business University at Albany, SUNY March 16, 2011
  • 2.
  • 3. Information Security Largest Data Breaches Based on: Attrition Data Loss Archive and Database, FlowingData March 03 June 04 June 05 May 06 Jan. 07 Mar. 07 July 07 Sept. 07 Nov. 07 Feb. 08 Visa, MasterCard, and American Express 40 million June 19, 2005 TJX Companies, Inc. 94 million January 17, 2007 U.S. Department of Veteran Affairs 26.5 million May 22, 2006 Dai Nippon Printing Company 8.6 million March 12, 2007 Data Processors International 5 million March 6, 2003 Citigroup 30 million June 6, 2005 America Online 30 million June 24, 2004 Fidelity National Information Services 8.5 million July 3, 2007 TD Ameritrade 6.3 million Sept. 14, 2007 HM Revenue and Customs 25 million Nov. 20, 2007 Bank of NY Mellon 12.5 million Feb. 27, 2008
  • 4. Information Security Crimes are Same Avenues Have Changed
  • 5.

Notas do Editor

  1. Speaking Points: Use a home detection system to give examples of each separate purpose. Deter: Avoid or prevent the occurrence of an undesirable event Protect: Safeguard the information assets from adverse events Detect: Identify the occurrence of an undesirable event Respond: React to or counter an adverse effect Recover: Restore integrity, availability and confidentiality of information assets