RISKS
and THREATS for I.T.
- attacks - as explained by Bruce Schneier |
. | This page
used in the following courses taught by Prof. Richardson
.
|
DRO
|
Digital
Risk Officer |
"Gartner Says
2015 Will See the Emergence of Digital Risk and the Digital Risk Officer"
http://www.gartner.com/newsroom/id/2794417 "The mandate and scope of a DRO is very different than a chief information security officer (CISO) and in many organizations the CISO role will continue with similar scope as in 2014. The DRO will report to a senior executive role outside of IT such as the chief risk officer, chief digital officer or the chief operating officer. They will manage risk at an executive level across digital business units working directly with peers in legal, privacy, compliance, digital marketing, digital sales and digital operation" "Development of a digital risk management capability requires deconstruction and re-engineering of current organizational structures and allocations of responsibility as well as the development of new capabilities in security and risk assessment, monitoring, analysis and control." |
Differences
in prevention, detection and response between crime and cybercrime?
A video segment from a speech
given by Tim Richardson in October 2013 at The Mackenzie Institute
|
Chpt 3 Types of
|
Secrets &
Lies: Digital Security in a Networked World
by Bruce Schneier Chpt 3 Attacks
|
Chpt 3 Types of
|
see witiger.com/ecommerce/identitytheft.htm see witiger.com/ecommerce/DNSattacks.htm |
Chpt 3 Types of
- Scams |
Scams
Schneier quotes the National Consumers League (Chpt 3, page 24) "the five most common online scams are - see www.witiger.com/ecommerce/scams.htm
|
|
CONTACT I MAIN PAGE I NEWS GALLERY I E-BIZ SHORTCUTS I INT'L BIZ SHORTCUTS I MKTG&BUSINESS SHORTCUTS I TEACHING SCHEDULE |
. | |
MISTAKES ITEXTS USED I IMAGES I RANK IDISCLAIMER I STUDENT CONTRIBUTORS I FORMER STUDENTS I | |
. |