.updated Oct 9
Assignment 2 MGD 426
Risk Management for Digital Industries
A 4th year course at the University of Toronto at Mississauga 
.
For a Digital Enterprise
 
 

TRV
Threat Risk Vulnerability, Countermeasures
Focus on identifying some of the most current threats to Digital Industries

This assignment will have students researching specific examples of threat(s) to an enterprise operating in a business sector in which the product they sell, or the products they buy, are mostly in digital form.

Reason for the assignment
 
One of the biggest challenges in 2014 is recognizing a threat.

Why is it hard to see a threat?
Threats to a digital enterprise are not like physical threats which can be easily seen and, through experience, we can evaluate a fight or flight response.

Threat recognition
The Proper State of Mind
"Situational awareness is the process of recognizing a threat at an early stage and taking measures to avoid it. Being observant of one's surroundings and identifying potential threats and dangerous situations is more of an attitude or mindset than it is a hard skill. Because of this, situational awareness is not just a process that can be practiced by highly trained government agents or specialized corporate security countersurveillance teams — it can be adopted and employed by anyone."
http://www.stratfor.com/threats_situational_awareness_and_perspective#axzz3GKcYTtOt
 

Threats to a digital enterprise can be purely digital, and therefore intangible, or they can be a physical device which captures or effects the shape or format or integriety of some digital information. (think of a hand held device which swipes the data off the magnetic stripe on a credit card)

The nature of the technological environment, and the applications in branded consumer products, is progressing at such a fast pace that there is an explosion (figuratively) in the variety of hand held devices that exist, which, can be used for nefarious purposes. Even something as simple as suppressing the shutter click sound on a smart phone allows someone to take a video of a person in a vulnerable situation such that they may inadvertently reveal the typing in of a password, or some other access control protocol.

What you do

Describe and analyze a threat.
Identify a particular kind of threat that would effect a an enterprise operating in a business sector in which the product they sell, or the products they buy, are mostly in digital form.

For example,

Recognizing Insider Threats
 http://www.datacenterjournal.com/it/recognizing-insider-threats/

Type this up in a short report with appropriate images, charts, references etc. and
hand in at the beginning of class Nov 6

This is worth 15 percent
 
 
witiger.com
  CONTACT I MAIN PAGE I NEWS GALLERY I E-BIZ SHORTCUTS I INT'L BIZ SHORTCUTS I MKTG&BUSINESS SHORTCUTS I TEACHING SCHEDULE
.
  MISTAKES ITEXTS USED I IMAGES I RANK IDISCLAIMER I STUDENT CONTRIBUTORS I FORMER STUDENTS I PUBLICATIONS I TIPSfor those On The Level who believe in faith, hope and charity
.
.