The Information Security and Privacy Tradeshow. CIS 8080 Security/Privacy of Information Richard Baskerville

Size: px
Start display at page:

Download "The Information Security and Privacy Tradeshow. CIS 8080 Security/Privacy of Information Richard Baskerville"

Transcription

1 The Information Security and Privacy Tradeshow CIS 8080 Security/Privacy of Information Richard Baskerville This activity simulates a market in which participants aim to offer the best information security and privacy products. In this market participants evaluate the products according to known criteria and acquire products from the market. Successes arise when products sell well in the market. Successes also arise when products are effectively evaluated. Each team (Aces, Kings, etc.) is allowed to offer a product to the course tradeshow. The product should be represented in a tradeshow booth. At a minimum, the booth should include a representative of the team and a product brochure. The booth may also include a poster, art, demos, video, etc., but at least a brochure is required for scoring purposes. At a minimum, the product brochure should be a product brief that summarizes the purpose of the product, the targeted market/customers for the product, the features of the product, its benefits relative to similar products on the market, and its business value. The brochure should also detail the team s name and the team member names. The booth and the brochure should aim to critically explain and assesses the product to be demonstrated in in the tradeshow. Along the way, they should demonstrate the students ability to research a technical problem and its solutions, analyze data, synthesize data from different sources, and to compare and to evaluate distinct solution technologies with a clear train of fact-based argumentation. Any and all conclusions must be clearly stated. To insure research originality, students are strongly encouraged to seek information beyond web pages, and from at least one original source (such as an interview with an authority on the subject). To be complete and authoritative, the booth and brochure should include citations and full references to all direct sources. Choosing a Product to Sell in the Tradeshow The product must be a real information security and privacy product available for purchase in the contemporary marketplace. The selected product must not replicate a product previously claimed by another team via the course BrightSpace/D2L discussion set aside for this purpose. See evaluation criteria for more hints on the qualities of a good product for this tradeshow. To claim your team s product: 1. Logon to the course BrightSpace/D2L page. 2. Choose Discussions from the Menu. 3. Choose Topic Claims from the course content items 4. Choose the Security product claim discussion. 5. Read the example from the instructor 6. Verify that no team has claimed your topic by reviewing all existing claims (threads) 7. Choose Start a new thread to add your claim to the discussion. Include a URL for the product. Choosing a Product to Buy in the Tradeshow Each team will also rank all products in the tradeshow. Each team is allowed to buy three products at the tradeshow. A team may NOT buy or rank its own product. The purchase decision should be based Page 1 of 5

2 on the product s purpose/features and the team s evaluation of the product. At least one purchased product should treat the risk described by the purchasing team s threat scenario for Jashopper. In certain circumstances, highly ranked products may not be ideal for purchase. For example, if the three highest ranked products are all firewalls, purchasing three different kinds of firewalls could duplicate functionality and provide less security than buying the top ranked firewall and two other kinds of products. Tradeshow Operation At least one member of each team should tend the team s product booth to pitch the product to interested buyers. At least one member of each team should visit other product booths to evaluate and buy products. Scoring: Teams are graded on their ability to deliver a successful information security product to the market, and their ability to evaluate products available in this market. Each team must submit three items for scoring: (1) The team s product brochure. (2) A photo of the team s booth. (3) The team s evaluation and purchase report. Product Tradeshow Success: 80 Percent Scoring is based on product quality ranking by experts in the market, and success in the market product sales. Product Evaluation: 20 Percent Scoring is based on the team s rationale in applying the criteria to products in its product selection decision-making Tradeshow Evaluation Criteria (Overall criterion) 1. How well does this product deliver business value to its customers? (Criteria based on ISO/IEC Information Security Risk Management) 2. What kinds of organizations are vulnerable to these risks? 3. How prevalent are these risks? 4. How effective is the product in its treatment of these risks? 5. How difficult is it to acquire? What is the installation and training burden? 6. Does the product enable monitoring and review of its effectiveness? (Criteria based on ISO/IEC Requirements for bodies providing audit and certification of information security management systems) 7. Does the operation of this product require new/additional competencies in the organization or its auditors? 8. Does the product support certification of its performance (or security/privacy performance)? (Criteria based on ISO/IEC Code of practice for information security management) 9. Does the product fit needs for controls that are essential and/or common practice? E.g., a. Legislatively essential information security controls: i. data protection and privacy of personal information (see ); ii. protection of organizational records (see ); iii. intellectual property rights (see ). Page 2 of 5

3 b. Common practice information security controls: i. information security policy document (see 5.1.1); ii. allocation of information security responsibilities (see 6.1.3); iii. information security awareness, education, and training (see 8.2.2); iv. correct processing in applications (see 12.2); v. technical vulnerability management (see 12.6); vi. business continuity management (see 14); vii. management of information security incidents and improvements (see 13.2). 10. Does the product treat the best categories of information security and privacy controls for the situation? a. Security Policy b. Organization of Information Security c. Human Resources Security d. Asset Management e. Access Control f. Cryptography g. Physical And Environmental Security h. Operations security i. Communications Security j. Information Systems Acquisition, Development, Maintenance k. Supplier Relationships l. Information Security Incident management m. Information Security Aspects of Business Continuity n. Compliance (Criterion based on immediate problem) 11. How effective would this product be for treating your team s Jashopper Threat Scenario? Page 3 of 5

4 Team Evaluation and Purchase Report Team Name: Team Members: Products Purchased (Order is not significant): (1) (2) (3) Product Name Vending Team Name Rationale for selecting these three products: Comments on products usefulness for your Jashopper threat scenario: Page 4 of 5

5 Team s Vendor Product Ranking Team Name Ranking Reason Page 5 of 5

ISO 27002:2013 Version Change Summary

ISO 27002:2013 Version Change Summary Information Shield www.informationshield.com 888.641.0500 sales@informationshield.com Information Security Policies Made Easy ISO 27002:2013 Version Change Summary This table highlights the control category

More information

NABET Criteria for INFORMATION SECURITY MANAGEMENT SYSTEMS (ISMS) Lead Auditor Training Courses

NABET Criteria for INFORMATION SECURITY MANAGEMENT SYSTEMS (ISMS) Lead Auditor Training Courses NABET Criteria for INFORMATION SECURITY MANAGEMENT SYSTEMS (ISMS) Lead Auditor Training Courses - 0 - Section 1: INTRODUCTION 1.1 This auditor/lead auditor training course shall provide training for potential

More information

^H 3RD EDITION ITGOVERNANCE A MANAGER'S GUIOE TO OATA SECURITY ANO DS 7799/IS017799 ALAN CALDER STEVE WATKINS. KOGAN PAGE London and Sterling, VA

^H 3RD EDITION ITGOVERNANCE A MANAGER'S GUIOE TO OATA SECURITY ANO DS 7799/IS017799 ALAN CALDER STEVE WATKINS. KOGAN PAGE London and Sterling, VA ^H 3RD EDITION ITGOVERNANCE A MANAGER'S GUIOE TO OATA SECURITY ANO DS 7799/IS017799 ALAN CALDER STEVE WATKINS KOGAN PAGE London and Sterling, VA Contents Foreword by Nigel Turnbull How to use this book

More information

INFORMATION SYSTEMS. Revised: August 2013

INFORMATION SYSTEMS. Revised: August 2013 Revised: August 2013 INFORMATION SYSTEMS In November 2011, The University of North Carolina Information Technology Security Council [ITSC] recommended the adoption of ISO/IEC 27002 Information technology

More information

Compliance Services CONSULTING. Gap Analysis. Internal Audit

Compliance Services CONSULTING. Gap Analysis. Internal Audit Compliance Services Gap Analysis The gap analysis is a fast track assessment to establish understanding on an organization s current capabilities. The purpose of this step is to evaluate the current capabilities

More information

Information Technology Security Program

Information Technology Security Program Information Technology Security Program Office of the CIO December, 2008 1 AGENDA What is it? Why do we need it? An international Standard Program Components Current Status Next Steps 2 What is It? A Policy

More information

Security Controls What Works. Southside Virginia Community College: Security Awareness

Security Controls What Works. Southside Virginia Community College: Security Awareness Security Controls What Works Southside Virginia Community College: Security Awareness Session Overview Identification of Information Security Drivers Identification of Regulations and Acts Introduction

More information

Dokument Nr. 521.dw Ausgabe Februar 2013, Rev. 01. . Seite 1 von 11. 521d Seite 1 von 11

Dokument Nr. 521.dw Ausgabe Februar 2013, Rev. 01. . Seite 1 von 11. 521d Seite 1 von 11 Eidgenössisches Departement für Wirtschaft, Bildung und Forschung WBF Staatssekretariat für Wirtschaft SECO Schweizerische Akkreditierungsstelle SAS Checkliste für die harmonisierte Umsetzung der Anforderungen

More information

NEC s Efforts for Security NEC s Security Solution and Trend of Security Consulting Business

NEC s Efforts for Security NEC s Security Solution and Trend of Security Consulting Business NEC s Efforts for Security NEC s Security Solution and Trend of Security Consulting Business By Masashi SUGIURA* This paper is intended to summarize the security solutions of NEC together with the present

More information

(Instructor-led; 3 Days)

(Instructor-led; 3 Days) Information Security Manager: Architecture, Planning, and Governance (Instructor-led; 3 Days) Module I. Information Security Governance A. Introduction to Information Security Governance B. Overview of

More information

Information Security Management System (ISMS) Overview. Arhnel Klyde S. Terroza

Information Security Management System (ISMS) Overview. Arhnel Klyde S. Terroza Information Security Management System (ISMS) Overview Arhnel Klyde S. Terroza May 12, 2015 1 Arhnel Klyde S. Terroza CPA, CISA, CISM, CRISC, ISO 27001 Provisional Auditor Internal Auditor at Clarien Bank

More information

SRA International Managed Information Systems Internal Audit Report

SRA International Managed Information Systems Internal Audit Report SRA International Managed Information Systems Internal Audit Report Report #2014-03 June 18, 2014 Table of Contents Executive Summary... 3 Background Information... 4 Background... 4 Audit Objectives...

More information

I S O I E C 2 7 0 0 2 2 0 1 3 I N F O R M A T I O N S E C U R I T Y A U D I T T O O L

I S O I E C 2 7 0 0 2 2 0 1 3 I N F O R M A T I O N S E C U R I T Y A U D I T T O O L 15.1 ESTABLISH SECURITY AGREEMENTS WITH SUPPLIERS 15.1.1 EXPECT SUPPLIERS TO COMPLY WITH RISK MITIGATION AGREEMENTS Do you clarify the information security risks that exist whenever your suppliers have

More information

Department of Information Systems and Cyber Security

Department of Information Systems and Cyber Security The University of Texas at San Antonio 1 Department of Information Systems and Cyber Security All graduate programs in Information Systems and Cyber Security are accredited by AACSB International The Association

More information

Bellevue University Cybersecurity Programs & Courses

Bellevue University Cybersecurity Programs & Courses Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320

More information

NETS for Students: Extended Rubric for Grades 6 8

NETS for Students: Extended Rubric for Grades 6 8 DRAFT (September 7, 2004) Purpose: This draft version of the NETS extended rubric for Grades 6 8 is available online for educational technology professionals to review and provide feedback to the developers.

More information

EDUCORE ISO 20000 Expert Training

EDUCORE ISO 20000 Expert Training EDUCORE ISO 20000 Expert Training Overview ISO/IEC 20000 is the first international standard for IT service management. It was developed in 2005, by ISO/IEC JTC1 SC7 and revised in 2011. ISO/IEC 20000-1:2005

More information

Comprehensive Risk Assessment and Developing the Audit Plan

Comprehensive Risk Assessment and Developing the Audit Plan Comprehensive Risk Assessment and Developing the Audit Plan Laure Boyd, CIA, CGAP Internal Audit Manager Leon County Clerk of the Circuit Court and Comptroller Our Time Today Background Risk Assessment

More information

Security Engineering Best Practices. Arca Systems, Inc. 8229 Boone Blvd., Suite 750 Vienna, VA 22182 703-734-5611 ferraiolo@arca.com.

Security Engineering Best Practices. Arca Systems, Inc. 8229 Boone Blvd., Suite 750 Vienna, VA 22182 703-734-5611 ferraiolo@arca.com. Tutorial: Instructor: Topics: Biography: Security Engineering Best Practices Karen Ferraiolo, Arca Systems, Inc. 8229 Boone Blvd., Suite 750 Vienna, VA 22182 703-734-5611 ferraiolo@arca.com This tutorial

More information

Microsoft s Compliance Framework for Online Services

Microsoft s Compliance Framework for Online Services Microsoft s Compliance Framework for Online Services Online Services Security and Compliance Executive summary Contents Executive summary 1 The changing landscape for online services compliance 4 How Microsoft

More information

How To Implement Data Loss Prevention

How To Implement Data Loss Prevention Data Loss Prevention Implementation Initiatives THE HITACHI WAY White Paper By HitachiSoft America Security Solutions Group September, 2009 HITACHI SOFTWARE ENGINEERING AMERICA, LTD. Executive Summary

More information

Richard Gadsden Information Security Office Office of the CIO Information Services

Richard Gadsden Information Security Office Office of the CIO Information Services Information Security Compliance System Owner Training Richard Gadsden Information Security Office Office of the CIO Information Services Sharon Knowles Information Assurance Compliance MUSC Medical Center

More information

RESEARCH PAPERS FACULTY OF MATERIALS SCIENCE AND TECHNOLOGY IN TRNAVA SLOVAK UNIVERSITY OF TECHNOLOGY IN BRATISLAVA

RESEARCH PAPERS FACULTY OF MATERIALS SCIENCE AND TECHNOLOGY IN TRNAVA SLOVAK UNIVERSITY OF TECHNOLOGY IN BRATISLAVA RESEARCH PAPERS FACULTY OF MATERIALS SCIENCE AND TECHNOLOGY IN TRNAVA SLOVAK UNIVERSITY OF TECHNOLOGY IN BRATISLAVA 2012 Special Number QUALITY IN SERVICE MANAGEMENT SYSTEM ACCORDING TO ISO 20000 Ružena

More information

ISO/IEC 27002:2013 WHITEPAPER. When Recognition Matters

ISO/IEC 27002:2013 WHITEPAPER. When Recognition Matters When Recognition Matters WHITEPAPER ISO/IEC 27002:2013 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS www.pecb.com CONTENT 3 4 5 6 6 7 7 7 7 8 8 8 9 9 9

More information

Information Security Management System for Microsoft s Cloud Infrastructure

Information Security Management System for Microsoft s Cloud Infrastructure Information Security Management System for Microsoft s Cloud Infrastructure Online Services Security and Compliance Executive summary Contents Executive summary 1 Information Security Management System

More information

Recent Researches in Electrical Engineering

Recent Researches in Electrical Engineering The importance of introducing Information Security Management Systems for Service Providers Anel Tanovic*, Asmir Butkovic **, Fahrudin Orucevic***, Nikos Mastorakis**** * Faculty of Electrical Engineering

More information

I. PREREQUISITES For information regarding prerequisites for this course, please refer to the Academic Course Catalog.

I. PREREQUISITES For information regarding prerequisites for this course, please refer to the Academic Course Catalog. Note: Course content may be changed, term to term, without notice. The information below is provided as a guide for course selection and is not binding in any form, and should not be used to purchase course

More information

Usage of OPNET IT tool to Simulate and Test the Security of Cloud under varying Firewall conditions

Usage of OPNET IT tool to Simulate and Test the Security of Cloud under varying Firewall conditions Usage of OPNET IT tool to Simulate and Test the Security of Cloud under varying Firewall conditions GRADUATE PROJECT REPORT Submitted to the Faculty of The School of Engineering & Computing Sciences Texas

More information

Symantec Cyber Security Services: A Recipe for Disaster

Symantec Cyber Security Services: A Recipe for Disaster When On-The-Job Training Is a Recipe for Disaster How security simulation prepares IT staff for APTs, breaches and data leakages Contents Sometimes On-The-Job Training Is a Lousy Idea... 2 On-The-Job Training

More information

MARKETING KUNG FU: 25 Things. Every Marketing Department Needs. Use this checklist as a guide or as a starting point for your complete marketing plan.

MARKETING KUNG FU: 25 Things. Every Marketing Department Needs. Use this checklist as a guide or as a starting point for your complete marketing plan. MARKETING KUNG FU: 25 Things Every Marketing Department Needs Use this checklist as a guide or as a starting point for your complete marketing plan. 1 Your Business Plan How big is your market opportunity?

More information

Chapter 2 INDUSTRIAL BUYING BEHAVIOUR: DECISION MAKING IN PURCHASING

Chapter 2 INDUSTRIAL BUYING BEHAVIOUR: DECISION MAKING IN PURCHASING Chapter 1 THE ROLE OF PURCHASING IN THE VALUE CHAIN The role and importance of the purchasing and supply function in the value chain. The difference between concepts such as ordering, buying, purchasing,

More information

PII Compliance Guidelines

PII Compliance Guidelines Personally Identifiable Information (PII): Individually identifiable information from or about an individual customer including, but not limited to: (a) a first and last name or first initial and last

More information

I. PREREQUISITES For information regarding prerequisites for this course, please refer to the Academic Course Catalog.

I. PREREQUISITES For information regarding prerequisites for this course, please refer to the Academic Course Catalog. Note: Course content may be changed, term to term, without notice. The information below is provided as a guide for course selection and is not binding in any form, and should not be used to purchase course

More information

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY 229 Information Security Fundamentals

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY 229 Information Security Fundamentals RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE CISY 229 Information Security Fundamentals I. Basic Course Information A. Course Number & Title: CISY-229 Information Security Fundamentals B. New or Modified

More information

Cyber Security Consultancy Standard. Version 0.2 Crown Copyright 2015 All Rights Reserved. Page 1 of 13

Cyber Security Consultancy Standard. Version 0.2 Crown Copyright 2015 All Rights Reserved. Page 1 of 13 Cyber Security Consultancy Standard Version 0.2 Crown Copyright 2015 All Rights Reserved Page 1 of 13 Contents 1. Overview... 3 2. Assessment approach... 4 3. Requirements... 5 3.1 Service description...

More information

Core Monitoring Guide

Core Monitoring Guide Core Monitoring Guide April 2005 eta UNITED STATES DEPARTMENT OF LABOR EMPLOYMENT AND TRAINING ADMINISTRATION Core Monitoring Guide April 2005 United States Department of Labor Employment and Training

More information

Health Science Education II, August 2013, Page 1 of 5

Health Science Education II, August 2013, Page 1 of 5 Indiana Department of Education Indiana Academic Course Framework HEALTH SCIENCE EDUCATION II Health Science Education II is an extended laboratory experience at the student's choice of clinical site designed

More information

ADRIAN DAVIS INFORMATION SECURITY FORUM

ADRIAN DAVIS INFORMATION SECURITY FORUM Securing the Supply Chain: Guide to Risk Management ADRIAN DAVIS INFORMATION SECURITY FORUM Session ID: GRC-201B Session Classification: Intermediate Introduction Introduction Presentation based on research

More information

CIS 523/423 Disaster Recovery Business Continuity

CIS 523/423 Disaster Recovery Business Continuity CIS 523/423 Disaster Recovery Business Continuity Course Description A study of disaster recovery and business continuity as related to the information technology function in organizations. Topics will

More information

OCCUPATIONAL GROUP: Information Technology. CLASS FAMILY: Security CLASS FAMILY DESCRIPTION:

OCCUPATIONAL GROUP: Information Technology. CLASS FAMILY: Security CLASS FAMILY DESCRIPTION: OCCUPATIONAL GROUP: Information Technology CLASS FAMILY: Security CLASS FAMILY DESCRIPTION: This family of positions provides security and monitoring for the transmission of information in voice, data,

More information

ISM527 - Cyber Security Management

ISM527 - Cyber Security Management ISM527 - Cyber Security Management Credit Hours: 3 Contact Hours: This is a 3-credit course, offered in accelerated format. This means that 16 weeks of material is covered in 8 weeks. The exact number

More information

TABLE OF CONTENTS CHAPTER TITLE PAGE

TABLE OF CONTENTS CHAPTER TITLE PAGE viii TABLE OF CONTENTS CHAPTER TITLE PAGE TITLE PAGE DECLARATION DEDICATION ACKNOWLEDGEMENT ABSTRACT ABSTRAK TABLE OF CONTENTS LIST OF TABLES LIST OF FIGURES LIST OF APPENDICES I II III IV VI VII VIII

More information

Delphi Information 3 rd Party Security Requirements Summary. Classified: Public 5/17/2012. Page 1 of 11

Delphi Information 3 rd Party Security Requirements Summary. Classified: Public 5/17/2012. Page 1 of 11 Delphi Information 3 rd Party Security Requirements Summary Classified: Public 5/17/2012 Page 1 of 11 Contents Introduction... 3 Summary for All Users... 4 Vendor Assessment Considerations... 7 Page 2

More information

Information Security Management Systems. Chief Operating Officer, Director of Strategy and Business Development, Chief Information Security Officer

Information Security Management Systems. Chief Operating Officer, Director of Strategy and Business Development, Chief Information Security Officer Information Security Management Systems Chief Operating Officer, Director of Strategy and Business Development, Chief Information Security Officer atsec information security, 2013 ISO/IEC 27001 and related

More information

PAPER-6 PART-5 OF 5 CA A.RAFEQ, FCA

PAPER-6 PART-5 OF 5 CA A.RAFEQ, FCA Chapter-4: Business Continuity Planning and Disaster Recovery Planning PAPER-6 PART-5 OF 5 CA A.RAFEQ, FCA Learning Objectives 2 To understand the concept of Business Continuity Management To understand

More information

Safe Passage Online Training Overview. Objectives

Safe Passage Online Training Overview. Objectives Safe Passage Online Training Overview Copyright 2012 Safe Passage International, Inc. All rights reserved. Identify the features and benefits of the Safe Passage Training Management System (TMS). Explain

More information

To order the book click on the link, http://www.nelsonbrain.com/shop/micro/oap-hrpa6

To order the book click on the link, http://www.nelsonbrain.com/shop/micro/oap-hrpa6 Recruitment and Selection Author: Professor Mary Jo Ducharme, School of Human Resources Management York University Required Text: V.M. Catano, W.H. Wiesner, R.D. Hackett, L.L. Methot., Recruitment and

More information

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work Security concerns and dangers come both from internal means as well as external. In order to enhance your security posture

More information

ITM 641: Information Security Policies Syllabus Sanjay Goel School of Business University at Albany, State University of New York

ITM 641: Information Security Policies Syllabus Sanjay Goel School of Business University at Albany, State University of New York INSTRUCTOR INFORMATION Name: Sanjay Goel Email: goel@albany.edu Phone: (518) 442-4925 Office Location: BA 310b, University at Albany Office Hours: TBD CLASS INFORMATION Time: N/A Location: Online Dates:

More information

Marketing Services California Master Services Agreement Business Management Consulting Services No. 5-06-99-41 to December 30, 2009

Marketing Services California Master Services Agreement Business Management Consulting Services No. 5-06-99-41 to December 30, 2009 Table of Contents (Click on topic to go directly to that section.) Marketing Services 2 Marketing/Public Relations Plans, Analysis, and Development Market and/or Research Surveys Multi-media Production

More information

School Library Standards. for California Public Schools, Grades Nine through Twelve

School Library Standards. for California Public Schools, Grades Nine through Twelve School Library Standards for California Public Schools, Grades Nine through Twelve STANDARD 1 Students Access Information The student will access information by applying knowledge of the organization of

More information

Central Agency for Information Technology

Central Agency for Information Technology Central Agency for Information Technology Kuwait National IT Governance Framework Information Security Agenda 1 Manage security policy 2 Information security management system procedure Agenda 3 Manage

More information

Master of Science in Information Security and Assurance

Master of Science in Information Security and Assurance Master of Science in Information Security and Assurance The Master of Science in Information Security and Assurance is a competency-based degree program that encompasses the 10 security domains that are

More information

ND BUSINESS EDUCATION FRAMEWORKS. Entrepreneurial

ND BUSINESS EDUCATION FRAMEWORKS. Entrepreneurial ND BUSINESS EDUCATION FRAMEWORKS Entrepreneurship Course Code Course Name/Description Grade Levels Accreditation Time/Credit 14111 Entrepreneurship is a course designed to provide students with the skills

More information

INDIVIDUAL MASTERY for: St#: 1153366 Test: CH 9 Acceleration Test on 29/07/2015 Grade: B Score: 85.37 % (35.00 of 41.00)

INDIVIDUAL MASTERY for: St#: 1153366 Test: CH 9 Acceleration Test on 29/07/2015 Grade: B Score: 85.37 % (35.00 of 41.00) INDIVIDUAL MASTERY for: St#: 1153366 Grade: B Score: 85.37 % (35.00 of 41.00) INDIVIDUAL MASTERY for: St#: 1346350 Grade: I Score: 21.95 % (9.00 of 41.00) INDIVIDUAL MASTERY for: St#: 1350672 Grade: A

More information

Cyber Security solutions

Cyber Security solutions Cyber Security solutions The scenario IT security has become a highly critical issue for all businesses as a result of the growing pervasiveness and diffusion of ICT technology. Risks can arise both inside

More information

INDIVIDUAL MASTERY for: St#: 1141027 Test: CH 9 Acceleration Test on 09/06/2015 Grade: A Score: 92.68 % (38.00 of 41.00)

INDIVIDUAL MASTERY for: St#: 1141027 Test: CH 9 Acceleration Test on 09/06/2015 Grade: A Score: 92.68 % (38.00 of 41.00) INDIVIDUAL MASTERY for: St#: 1141027 Grade: A Score: 92.68 % (38.00 of 41.00) INDIVIDUAL MASTERY for: St#: 1172998 Grade: B Score: 85.37 % (35.00 of 41.00) INDIVIDUAL MASTERY for: St#: 1232138 Grade: B

More information

Four Top Emagined Security Services

Four Top Emagined Security Services Four Top Emagined Security Services. www.emagined.com Emagined Security offers a variety of Security Services designed to support growing security needs. This brochure highlights four key Emagined Security

More information

INTERMEDIATE QUALIFICATION

INTERMEDIATE QUALIFICATION PROFESSIONAL QUALIFICATION SCHEME INTERMEDIATE QUALIFICATION SERVICE CAPABILITY PLANNING, PROTECTION AND OPTIMIZATION CERTIFICATE SYLLABUS The Swirl logo is a trade mark of the Cabinet Office ITIL is a

More information

Office Office hours Email/Telephone. Monday: 8:00-9:45 or by appointment. 31-236 CHS Wednesday: 12:00-1PM or by appointment I. SYSTEMATIC EVALUATION

Office Office hours Email/Telephone. Monday: 8:00-9:45 or by appointment. 31-236 CHS Wednesday: 12:00-1PM or by appointment I. SYSTEMATIC EVALUATION [Version 031816] HPM 422: PRACTICES OF EVALUATION IN HEALTH POLICY & MANAGEMENT Spring 2016, M/W- 10:00-11:50 a.m. Room 33-105, HPM 422 Moodle Site: https://ccle.ucla.edu/course/view/14s-hltpolm422-2 Faculty

More information

ISO/IEC 27001:2013 Thema Änderungen der Kontrollen der ISO/IEC 27001:2013 im Vergleich zur Fassung aus 2005 Datum 20.01.2014

ISO/IEC 27001:2013 Thema Änderungen der Kontrollen der ISO/IEC 27001:2013 im Vergleich zur Fassung aus 2005 Datum 20.01.2014 ISO/IEC 27001:2013 Thema Änderungen der Kontrollen der ISO/IEC 27001:2013 im Vergleich zur Fassung aus 2005 Datum 20.01.2014 Legende: gering mittel hoch Änderungsgrad A.5 Information security policies

More information

Client Security Risk Assessment Questionnaire

Client Security Risk Assessment Questionnaire Select the appropriate answer from the drop down in the column, and provide a brief description in the section. 1 Do you have a member of your organization with dedicated information security duties? 2

More information

Office of the Auditor General Performance Audit Report. Statewide Oracle Database Controls Department of Technology, Management, and Budget

Office of the Auditor General Performance Audit Report. Statewide Oracle Database Controls Department of Technology, Management, and Budget Office of the Auditor General Performance Audit Report Statewide Oracle Database Controls Department of Technology, Management, and Budget March 2015 071-0565-14 State of Michigan Auditor General Doug

More information

Analysis of Information Security Management Systems at 5 Domestic Hospitals with More than 500 Beds

Analysis of Information Security Management Systems at 5 Domestic Hospitals with More than 500 Beds Original Article Healthc Inform Res. 2010 June;16(2):89-99. pissn 2093-3681 eissn 2093-369X Analysis of Information Security Management Systems at 5 Domestic Hospitals with More than 500 Beds Woo-Sung

More information

CENTRAL TEXAS COLLEGE ITSY 2459 SECURITY ASSESSMENT AND AUDITING. Semester Hours Credit: 4 INSTRUCTOR: OFFICE HOURS:

CENTRAL TEXAS COLLEGE ITSY 2459 SECURITY ASSESSMENT AND AUDITING. Semester Hours Credit: 4 INSTRUCTOR: OFFICE HOURS: CENTRAL TEXAS COLLEGE ITSY 2459 SECURITY ASSESSMENT AND AUDITING Semester Hours Credit: 4 INSTRUCTOR: OFFICE HOURS: I. INTRODUCTION A. Capstone experience for the security curriculum. Synthesizes technical

More information

Application for CISM Certification

Application for CISM Certification Application for CISM Certification 4/2015 Requirements to Become a Certified Information Security Manager become a Certified Information Security Manager (CISM), an applicant must: 1. Score a passing grade

More information

Standards. Interactive Media, July 2012, Page 1 of 6

Standards. Interactive Media, July 2012, Page 1 of 6 Indiana Department of Education Academic Course Framework INTERACTIVE MEDIA Interactive Media prepares students for careers in business and industry working with interactive media products and services;

More information

Internet Security Awareness Program in Georgia funded by ISOC Community Grants Programme

Internet Security Awareness Program in Georgia funded by ISOC Community Grants Programme Internet Security Awareness Program in Georgia funded by ISOC Community Grants Programme Final Report July, 2011 Prepared by David Tabatadze Project Coordinator info@isap.ge Project Overview With the internet

More information

Completing an Accounts Payable Audit With ACL (Aired on Feb 15)

Completing an Accounts Payable Audit With ACL (Aired on Feb 15) AuditSoftwareVideos.com Video Training Titles (ACL Software Sessions Only) Contents Completing an Accounts Payable Audit With ACL (Aired on Feb 15)... 1 Statistical Analysis in ACL The Analyze Menu (Aired

More information

I. PREREQUISITES For information regarding prerequisites for this course, please refer to the Academic Course Catalog.

I. PREREQUISITES For information regarding prerequisites for this course, please refer to the Academic Course Catalog. Note: Course content may be changed, term to term, without notice. The information below is provided as a guide for course selection and is not binding in any form, and should not be used to purchase course

More information

I. Introduction to Privacy: Common Principles and Approaches

I. Introduction to Privacy: Common Principles and Approaches I. Introduction to Privacy: Common Principles and Approaches A. A Modern History of Privacy a. Descriptions and definitions b. Historical and social origins c. Information types i. Personal and non-personal

More information

Reduce risk. Reduce cost. Raise performance.

Reduce risk. Reduce cost. Raise performance. Reduce risk. Reduce cost. Raise performance. Services for professional procurement. Be better informed, make better decisions. Achilles procurement toolkit Support for sourcing and supplier management

More information

Website Marketing Audit. Example, inc. Website Marketing Audit. For. Example, INC. Provided by

Website Marketing Audit. Example, inc. Website Marketing Audit. For. Example, INC. Provided by Website Marketing Audit For Example, INC Provided by State of your Website Strengths We found the website to be easy to navigate and does not contain any broken links. The structure of the website is clean

More information

SHARED ASSESSMENTS PROGRAM STANDARD INFORMATION GATHERING (SIG) QUESTIONNAIRE 2014 MAPPING TO OCC GUIDANCE (2013-29) ON THIRD PARTY RELATIONSHIPS

SHARED ASSESSMENTS PROGRAM STANDARD INFORMATION GATHERING (SIG) QUESTIONNAIRE 2014 MAPPING TO OCC GUIDANCE (2013-29) ON THIRD PARTY RELATIONSHIPS SHARED ASSESSMENTS PROGRAM STANDARD INFORMATION GATHERING (SIG) QUESTIONNAIRE 2014 MAPPING TO OCC GUIDANCE (2013-29) ON THIRD PARTY RELATIONSHIPS An overview of how the Shared Assessments Program SIG 2014

More information

Guide to. event marketing & trade show display strategies. www.nationalevent.com. www.outdooradventureshow.ca

Guide to. event marketing & trade show display strategies. www.nationalevent.com. www.outdooradventureshow.ca Guide to event marketing & trade show display strategies This guide is brought to you by: For a complete show schedule please visit: www.outdooradventureshow.ca The return on your investment in consumer

More information

How is Lead Scoring Implemented? Implementing lead scoring policies is done in three phases:

How is Lead Scoring Implemented? Implementing lead scoring policies is done in three phases: Lead Scoring What is Lead Scoring? Simply put, lead scoring is an automated way to qualify leads. Successful companies have proven that focusing on quality vs. quantity of leads is an optimal strategy.

More information

Goals. Understanding security testing

Goals. Understanding security testing Getting The Most Value From Your Next Network Penetration Test Jerald Dawkins, Ph.D. True Digital Security p. o. b o x 3 5 6 2 3 t u l s a, O K 7 4 1 5 3 p. 8 6 6. 4 3 0. 2 5 9 5 f. 8 7 7. 7 2 0. 4 0 3

More information

NABET Criteria for OH&S Lead Auditor Training Course

NABET Criteria for OH&S Lead Auditor Training Course NABET Criteria for OH&S Lead Auditor Training Course - 0 - Section 1: INTRODUCTION 1.1 The primary focus of the auditor/lead auditor training course shall be on training students to audit Occupational

More information

White paper. Secure Cloud Services: An Integrated Approach

White paper. Secure Cloud Services: An Integrated Approach White paper Secure Cloud Services: An Integrated Approach Edition October 2013 Whitepaper Information Management Secure Cloud Services: An Integrated Approach Edition October 2013 Copyright 2013 EXIN All

More information

Assignments and Activities for Online Courses

Assignments and Activities for Online Courses Assignments and Activities for Online Courses We encourage you to take full advantage of the possibilities suggested by the online environment and to experiment with new approaches to student learning.

More information

FINAL DOCUMENT. Guidelines for Regulatory Auditing of Quality Management Systems of Medical Device Manufacturers Part 1: General Requirements

FINAL DOCUMENT. Guidelines for Regulatory Auditing of Quality Management Systems of Medical Device Manufacturers Part 1: General Requirements GHTF/SG4/N28R4:2008 FINAL DOCUMENT Title: Guidelines for Regulatory Auditing of Quality Management Systems of Medical Device Manufacturers Authoring Group: GHTF Study Group 4 Endorsed by: The Global Harmonization

More information

Healthcare Technology Audit Basics. Session Objectives

Healthcare Technology Audit Basics. Session Objectives Healthcare Technology Audit Basics Jennifer McGill, CIA, CISA, CGEIT April 20, 2015 Session Objectives Review information technology basic concepts. Use real world examples to identify and understand healthcare

More information

3/17/2015. Healthcare Technology Audit Basics. Session Objectives. Jennifer McGill, CIA, CISA, CGEIT April 20, 2015

3/17/2015. Healthcare Technology Audit Basics. Session Objectives. Jennifer McGill, CIA, CISA, CGEIT April 20, 2015 Healthcare Technology Audit Basics Jennifer McGill, CIA, CISA, CGEIT April 20, 2015 Session Objectives Review information technology basic concepts. Use real world examples to identify and understand healthcare

More information

TEACHER CERTIFICATION STUDY GUIDE INFORMATION ACCESS AND DELIVERY IN THE LIBRARY MEDIA PROGRAM

TEACHER CERTIFICATION STUDY GUIDE INFORMATION ACCESS AND DELIVERY IN THE LIBRARY MEDIA PROGRAM Table of Contents SUBAREA I. COMPETENCY 1.0 INFORMATION ACCESS AND DELIVERY IN THE LIBRARY MEDIA PROGRAM UNDERSTAND THE MISSION OF THE LIBRARY MEDIA PROGRAM AND THE ROLES AND RESPONSIBILITIES OF THE MEDIA

More information

MAR 4625, Direct Marketing Course Syllabus. Course Description. Course Textbook. Course Learning Outcomes. Credits.

MAR 4625, Direct Marketing Course Syllabus. Course Description. Course Textbook. Course Learning Outcomes. Credits. MAR 4625, Direct Marketing Course Syllabus Course Description An overview of direct marketing with an emphasis on database marketing, customer relationship marketing, and response-driven marketing. Provides

More information

I. PREREQUISITE For information regarding prerequisites for this course, please refer to the Academic Course Catalog.

I. PREREQUISITE For information regarding prerequisites for this course, please refer to the Academic Course Catalog. Note: Course content may be changed, term to term, without notice. The information below is provided as a guide for course selection and is not binding in any form, and should not be used to purchase course

More information

External Supplier Control Requirements

External Supplier Control Requirements External Supplier Control s Cyber Security For Suppliers Categorised as Low Cyber Risk 1. Asset Protection and System Configuration Barclays Data and the assets or systems storing or processing it must

More information

3 Setting Accounting Defaults

3 Setting Accounting Defaults 3 Setting Accounting Defaults In Chapter 3 of Computer Accounting Essentials with QuickBooks Online Plus Edition, you will learn how to set defaults. Defaults are information or commands that the software

More information

CESG Certification of Cyber Security Training Courses

CESG Certification of Cyber Security Training Courses CESG Certification of Cyber Security Training Courses Supporting Assessment Criteria for the CESG Certified Training (CCT) Scheme Portions of this work are copyright The Institute of Information Security

More information

URPL- GP.4611 Intelligent Cities: Technology, Policy and Planning

URPL- GP.4611 Intelligent Cities: Technology, Policy and Planning Revised 7 April 2015 Spring 2015 URPL- GP.4611 Intelligent Cities: Technology, Policy and Planning Fridays, 9:15 10:55am Global Center for Academic & Spiritual Life, 238 Thompson Street, Room 265 March

More information

Security Standards. 17.1 BS7799 and ISO17799

Security Standards. 17.1 BS7799 and ISO17799 17 Security Standards Over the past 10 years security standards have come a long way from the original Rainbow Book series that was created by the US Department of Defense and used to define an information

More information

Governance, Risk, and Compliance (GRC) White Paper

Governance, Risk, and Compliance (GRC) White Paper Governance, Risk, and Compliance (GRC) White Paper Table of Contents: Purpose page 2 Introduction _ page 3 What is GRC _ page 3 GRC Concepts _ page 4 Integrated Approach and Methodology page 4 Diagram:

More information

Techno Security's Guide to Securing SCADA

Techno Security's Guide to Securing SCADA Techno Security's Guide to Securing SCADA Foreword xxiii Chapter 1 Physical Security: SCADA and the Critical Infrastructure's Biggest Vulnerability 1 Introduction 2 Key Control 3 Check All Locks for Proper

More information

MED_INF 403-DL: Introduction to Medical Informatics Fall 2011

MED_INF 403-DL: Introduction to Medical Informatics Fall 2011 Dr. David Levine david-levine-0@northwestern.edu Office Phone: 312-775-4244 between 9 a.m. and 3 p.m. Monday through Friday. Office Hours: By appointment (day and evening available). Course Description

More information

New York StartUP! 2013 Business Plan Competition Company Profile

New York StartUP! 2013 Business Plan Competition Company Profile New York StartUP! 2013 Business Plan Competition Company Profile Company Name: Year Founded: Contact Name: Address: City State Zip: Target Market: Customer Problem: Email: p: f: URL: Industry: # Employees:

More information

Proposed Syllabus by C.S.J.M.University,Kanpur. Bachelors of Computer Application

Proposed Syllabus by C.S.J.M.University,Kanpur. Bachelors of Computer Application BCA-S307 Computer Network Security 4 0 0 4 Introduction: Attack, Services and Mechanism, Model for Internetwork Security. Cryptography: Notion of Plain Text, Encryption, Key, Cipher Text, Decryption and

More information

NEOSHO COUNTY COMMUNITY COLLEGE MASTER COURSE SYLLABUS. Division: Applied Science (AS) Liberal Arts (LA) Workforce Development (WD)

NEOSHO COUNTY COMMUNITY COLLEGE MASTER COURSE SYLLABUS. Division: Applied Science (AS) Liberal Arts (LA) Workforce Development (WD) NEOSHO COUNTY COMMUNITY COLLEGE MASTER COURSE SYLLABUS COURSE IDENTIFICATION Course Code/Number: ETEC 275 Course Title: Computer and Network Security Division: Applied Science (AS) Liberal Arts (LA) Workforce

More information

TOP 10 Security Questions Introduction Breaches and other privacy and security incidents in healthcare are on the rise due to the vast size of the industry and the oneoffs of protected health information

More information