SENECA COLLEGE, TORONTO | |||||||
|
|||||||
As Taught by Prof. Tim Richardson School of Marketing and e-Business, Faculty of Business |
Section 1 | Section 2 | Section 3 | Section 4 | Section 5 |
Risks
of Insecure Systems Internal
Risks with
Types of attacks
Data
Viruses |
Internet
Security Standards RSA Security SANS Institute
Threat
Security Policies
Security Processes .compartmentalize .secure weak link .use choke points .defense in depth .enlist users .detect attacks Threats - "Who" -Hackers -Crackers |
Cryptography
and Authentification Cryptography Video Identification and Authentification .Confidentiality .Integrity .Authentification .Non-repudiation Access Controls Encryption
Key Management
Public Key
Digital Signatures
email security . PGP . PEM Wireless security RSA & Wireless |
Firewalls
Components of a
Functionality Securing the
Firewall
Penetration
Intrusion
|
This
section is additional supplementary
material Government Industry
Gov't response
National Government Involvement in internet crime and e-business security CSIS
The Nigerian Scam
Professional
|
. | . | . | . | . |
Grading Information (How the marks are calculated) |