Information Security
This course provided by the Department of CIS at the Zicklin School of Business, Baruch College, delves into significant security threats in IT, illustrated through high-profile incidents like the TJX and Target breaches. Students will learn about various vulnerabilities, including insider threats and social engineering techniques such as phishing. The course emphasizes the importance of prioritizing security in organizations, blending technical solutions with personnel training. Key safety measures like firewalls, intrusion detection systems, and encryption methods will be discussed to equip students with practical knowledge.
Information Security
E N D
Presentation Transcript
Information Security CIS 9002 Kannan Mohan Department of CIS Zicklin School of Business, Baruch College
Learning Objectives • Examine the various security threats posed by IT and solutions that can be used to address these threats
Information Security - Threats • Network Infiltration at TJX • Breach at Target • Lessons • Security as organizational priority • Blend of technical and personnel issues
Sources of Vulnerabilities • Insiders • Social engineering • Phishing • Passwords
Technology Threats • Viruses • Worms • Trojans • Adware • Spyware • Keylogger • Denial of Service Attacks
Solutions • Firewalls • Intrusion detection • Updates • Encryption
Public Key Encryption (Laudon and Laudon, 2009)
Digital Certificates (Laudon and Laudon, 2009)