MGM 723 Privacy, Security, Data Integrity and Organization
a course taught in
the Social Media Analytics graduate certificate  senecacollege.ca/fulltime/SMA.html
the Sales Force Automation and CRM Analytics graduate certificate  senecacollege.ca/fulltime/SAA.html
the Strategic Marketing and Marketing Analytics graduate certificate  senecacollege.ca/fulltime/SMM.html
updated 2017 Feb 22
For the section(s) taught by Prof. Tim Richardson Feb 8, 15 and 22 in 2017
 
Feb Feb Feb Feb
tips specific to earning class participation / contribution marks
read on your own
-------------------------------
www.schneier.com
he has a great blog
------------------------------
Risks associated with
4Ps and 6Es
4Ps are things you can control
6Es are things you cannot control
d
------------------------------
Difference between 
Regular Crime and 
Cyber Crime
http://www.youtube.com/watch?v=3S0KvbX9fHI
41 sec.
did Feb 8
-------------------------------
Risk and Threat for I.T.
Intro - fundamentals
did Feb 8
Vulnerability can exist in many forms
- pancake story
------------------------------------------
Asymetrical Cyber Security.
http://www.youtube.com/watch?v=l0JbPQBmUP0
Asymmetrical Cyber Security
relationship to Guerilla Warfare
did Feb 8
http://www.witiger.com/ecommerce/LAWs-rocket.jpg
did Feb 8
-------------------------------
Def'n of Risk 
Types of Risk
Risk Description
Risk Classification
Risk Likelihood and Magnitude
-------------------------------
Impact of Risk 
Level of Risk
Impact of Hazard Risk
Risk and Reward
-------------------------------
Types of attacks
did 
Types of Cyber Security Threats - simple intro
cyber threats simply explained by two students
student video 2014 Nov.
.
Types of Risk 
 o Hazard Risk
aka Pure Risk
 o Control Risk 
 o Opportunity Risk
aka Speculative Risk
http://www.youtube.com/watch?v=xEDH5cdB6tw
video discussing differences between 
Speculative (Opportunity) Risk 
and Pure (Hazard) Risk
f
--------------------------------
Development of Risk Management
Terms
f
Asset
Threat Agent
Vulnerability
Exposure
Countermeasure

R=TxVxC
Risk=Threat x Vulnerability x Cost
did Feb 15
--------------------------------
o Privacy Issues
m
o Privacy Issues-Social Media
o Privacy Violations
o Identity Theft
- discussed credit card account takeover example
did Feb 8
(the ID theft page includes many interesting student videos


Mnemonic Passwords
did Feb 15
------------------------------------
o Social Engineering
did Feb 8 and Feb 15
------------------------ 
o Email filtering
did 
o Patches
did 
- Patches video
 

o Hackers
did partly Feb 15
o Hacking and the Trojan
   Horse
did Feb 15
o Hacking tools
did Feb 15
-----------------------------------
SOPs
Standard Operating Procedures

o Spyware
did Feb 22
also discussed difference between Spyware and Malware
--------------------------------
Competitor Intelligence
did Feb 15
- Humint
- Teckint
- Osint
- Geoint

discussed difference between Information and Intelligence
did Feb 15

videos on  SOURCES of COMPETITOR INTELLIGENCE
- add comments, 
- agree
- disagree
- new suggestions of sources
.

a branded consumer product
noted, make comments
.
http://www.youtube.com/watch?v=HxmPgv23rAM&feature=youtu.be
a branded consumer service
noted, make comments
.
http://www.youtube.com/watch?v=r_yr4pQpXd8&feature=youtu.be
an industrial product
noted, make comments
.
http://www.youtube.com/watch?v=Y6IWqk2SAqA&feature=youtu.be
an industrial service
noted, make comments
----------------------------------
Arthur Weiss
four stages in monitoring competitors - the four "C"s
did briefly Feb 15
1. Collecting the info
2. Convert info into intelligence 
- Collate and catalogue it, 
- Verify authenticity 
- Interpret it and Analyse it 
3. Communicating the intelligence. 
- to decision makers 
4. Countering any adverse competitor actions. 
----------------------------------

o Competitor Intelligence-Asia
did Feb 22
----------------------------------

Risk Management 
Risk Analysis
did Feb 15
read again on your own
http://www.youtube.com/watch?v=_QPamr31ZCU
di
AWB discussing Risk Analysis
- what are you protecting
- what is the threat
- how much can you spend
-------------------------------
o Scams
updated Feb 21
did Feb 22
+ Do Not Call Registry
+ 419 / Nigeria scams
+ Facebook scams 2015
for 
https://www.youtube.com/watch?v=Ia5LN0rBgrI
former TSC student Hasan Shahzad re: scams
f

o DoS Attacks
+ DDoS attacks on DNS

-------------------------------
leverage
- int'l finance risks
- export finance risks
EDC PEMD
f

HR risks
Market Risks
- product and consumer risks
Reputational (Branding) Risks
Special Topics
----------------------------------
Financial risk

intro credit card fraud
needs updating
 
 

Contingency planning and Risk Analysis
for Feb 22
 o Incident Response Planning
 o Disasater Recovery Planning
 o Business Continuity Planning

 

4T's of Hazard Risks
Tolerate
Treat
Transfer
Terminate
-----------------------------------
Political Environment
ISO 31000 compliance
n
Political Risk
d
OECD
OECD Principles of corporate governance

----------------------------

Risk Management Strategy

Prevention
Detection
Response
http://www.youtube.com/watch?v=FL3JazaPvOE
1 min. 23 sec
Differences in prevention, detection and response between crime and cybercrime?
- watch and 
make comments 
through YouTube
Deterrence
Response
d
(Incident response trends)
Schneier 
 schneier.com/news-185.html
relates to vulnerabilities in cloud computing

Countermeasures
d
watch video on Mnemonic passwords
http://www.youtube.com/watch?v=3rkY5M6Wzdw
mnemonics explained at 5:23 of the video
------------------------------------

Benefits to Managing Risk

Insurance Bureau of Canada
ibc.ca/en/Business
_insurance
/risk_management/
---------------------------

o Encryption
o Viruses
.
http://www.ctvnews.ca/video?clipId=325554
WTGR comment (April 2014) on Heartbleed virus and 900 SIN numbers stolen from CRA...on CTV
did June 3rd
- link down
also
 www.ctvnews.ca/mobile
/video?clipId=322864
.  .  .  .  .  .  .  .  .  .
.

o Firewalls
o Honey Pots

--------------------------------------
Domain Names 
o domain scams
d
o domain phishing
did Feb 22
o domain hacking
did
o domain Verisign issues
relates to fake renewal notices

Domain Name Phishing and Spear Phishing explained in a video
http://www.youtube.com/watch?v=Wpx5IMduWX4
2 min 10 sec
d

http://www.witiger.com/ecommerce/domainnamesregister.htm

Video 6  hacking

--------------------------------
Competition
o Who is Competition
(
o Types of competition
(

Outsourcing
Internal Risk & Threats
did Feb 22
existing employees
former employees
3rd party/outsourced employees

Third Party Risks
Outsourcing Risks
did Feb 22
-------------------------
 

How To Do Presentations
(read thoroughly on your own)
included video tips

general tips and help
 witiger.com/tips.htm
--------------- 
----------------------- 
What does it mean when you have to analyze something
- watch this video for tips
http://www.youtube.com/watch?v=VLjsOgVaA3Y
 
 
Security Strategies 
o Encryption
fo

Social Media Analysis and the encrption challenge
fo
Big Data - Encrption and Analytics
f
and tokenization

o Viruses
o Scams
o DNS Attacks
o Spyware
o Firewalls

Social media messaging is getting around traditional firewalls
fo

o Honey Pots

Responding 
o Deterrence
o Countermeasures
(all the above topics now taught in MGD426)
https://www.youtube.com/watch?v=FL3JazaPvOE
Differences between prevention, Detection and response


 
 

 

Feb 8 Feb 8
Feb 15
Feb 15
Feb 22
Feb 22
GRADING - How the marks are calculated
 
 
http://www.youtube.com/watch?v=bcuw9bMYgHY http://www.youtube.com/watch?v=8tXadb6IsKI http://www.youtube.com/watch?v=Zh_3o1npTEg http://www.youtube.com/watch?v=k1w28eG3jyA http://www.youtube.com/watch?v=xRrPMWWENhM http://www.youtube.com/watch?v=TI8JxwBvnII http://www.youtube.com/watch?v=wCxYyI_iWj0
Read The Newspaper
Part 1
Read The Newspaper
Part 2
getting rich on the stock market
Read The Newspaper
Part 3
learn an
Industry Sector
Read The Newspaper
Part 4
Business magazines
are important
Earning
Class
Participation
Marks
- basics
Class
Participation
- how you earn the highest marks
Class
Participation
- how they are calculated
- the numbers
..
http://www.youtube.com/watch?v=LxguksrUZfk http://www.youtube.com/watch?v=B7e9WSnC0Tk http://www.youtube.com/watch?v=ybZbld2gyLI http://www.youtube.com/watch?v=bsPyhq52IwU
Group Work
- what the Report should look like
- binding, pages, table of contents
Group Work / Reports Part 2
The importance of using "Mature Language" in your writing
Group Work / Reports Part 3
important considerations
Group Work / Reports Part 4
Coordinating the submission
Communication w group members

 
 
 
.. .,,,,
witiger.com
  CONTACT I MAIN PAGE I NEWS GALLERY I E-BIZ SHORTCUTS I INT'L BIZ SHORTCUTS I MKTG&BUSINESS SHORTCUTS I TEACHING SCHEDULE
.
  MISTAKES ITEXTS USED I IMAGES I RANK IDISCLAIMER I STUDENT CONTRIBUTORS I FORMER STUDENTS I PUBLICATIONS I TIPS Ifor those On The Level who believe in faith, hope and charity
.
.