30 likes | 151 Views
Information Security Recap. Defense in Depth Strategy Passwords, Physical Locks, Patching, Thinking! Strong Passwords and “Variables” Social Engineering, Phishing and Spyware Security tools: Virus Protection, Anti-spyware, SiteAdvisor , UAWiFi and VPNs
E N D
Information Security Recap • Defense in Depth Strategy • Passwords, Physical Locks, Patching, Thinking! • Strong Passwords and “Variables” • Social Engineering, Phishing and Spyware • Security tools: Virus Protection, Anti-spyware, SiteAdvisor, UAWiFi and VPNs • Authentication – Knowing you are really you • Something A User Is (Biometrics), Has (Card), Does (Signature), or Knows (Password)
Digital Identity Recap • Competing Rights • Freedom of Speech vs. Right to Reputation • Components of Online Reputation • Location-based (Geo-tagging), Social media and networking, Blogging and Messaging • Employment Background Checking • 63% Filter before the interview (discrimination issues) • Dimensions of privacy • Anonymity, Confidentiality, Security
Ethics in Business and Eller • Recognizing ethical situations • Gut check, Transparency test, Ethical drift • Case Study: David Myers (MCI/Worldcom) • Ethical Dilemmas • Who Am I? Integrity vs. Loyalty Whistleblowing • Who Are We? Organizational Ethical Values Short term vs long term • Integrity Testing Job Screening • E-TegrityGoodcat hotline Board of Honor and Integrity