The Information Security and Privacy Tradeshow. CIS 8080 Security/Privacy of Information Richard Baskerville
|
|
- Britton McGee
- 8 years ago
- Views:
Transcription
1 The Information Security and Privacy Tradeshow CIS 8080 Security/Privacy of Information Richard Baskerville This activity simulates a market in which participants aim to offer the best information security and privacy products. In this market participants evaluate the products according to known criteria and acquire products from the market. Successes arise when products sell well in the market. Successes also arise when products are effectively evaluated. Each team (Aces, Kings, etc.) is allowed to offer a product to the course tradeshow. The product should be represented in a tradeshow booth. At a minimum, the booth should include a representative of the team and a product brochure. The booth may also include a poster, art, demos, video, etc., but at least a brochure is required for scoring purposes. At a minimum, the product brochure should be a product brief that summarizes the purpose of the product, the targeted market/customers for the product, the features of the product, its benefits relative to similar products on the market, and its business value. The brochure should also detail the team s name and the team member names. The booth and the brochure should aim to critically explain and assesses the product to be demonstrated in in the tradeshow. Along the way, they should demonstrate the students ability to research a technical problem and its solutions, analyze data, synthesize data from different sources, and to compare and to evaluate distinct solution technologies with a clear train of fact-based argumentation. Any and all conclusions must be clearly stated. To insure research originality, students are strongly encouraged to seek information beyond web pages, and from at least one original source (such as an interview with an authority on the subject). To be complete and authoritative, the booth and brochure should include citations and full references to all direct sources. Choosing a Product to Sell in the Tradeshow The product must be a real information security and privacy product available for purchase in the contemporary marketplace. The selected product must not replicate a product previously claimed by another team via the course BrightSpace/D2L discussion set aside for this purpose. See evaluation criteria for more hints on the qualities of a good product for this tradeshow. To claim your team s product: 1. Logon to the course BrightSpace/D2L page. 2. Choose Discussions from the Menu. 3. Choose Topic Claims from the course content items 4. Choose the Security product claim discussion. 5. Read the example from the instructor 6. Verify that no team has claimed your topic by reviewing all existing claims (threads) 7. Choose Start a new thread to add your claim to the discussion. Include a URL for the product. Choosing a Product to Buy in the Tradeshow Each team will also rank all products in the tradeshow. Each team is allowed to buy three products at the tradeshow. A team may NOT buy or rank its own product. The purchase decision should be based Page 1 of 5
2 on the product s purpose/features and the team s evaluation of the product. At least one purchased product should treat the risk described by the purchasing team s threat scenario for Jashopper. In certain circumstances, highly ranked products may not be ideal for purchase. For example, if the three highest ranked products are all firewalls, purchasing three different kinds of firewalls could duplicate functionality and provide less security than buying the top ranked firewall and two other kinds of products. Tradeshow Operation At least one member of each team should tend the team s product booth to pitch the product to interested buyers. At least one member of each team should visit other product booths to evaluate and buy products. Scoring: Teams are graded on their ability to deliver a successful information security product to the market, and their ability to evaluate products available in this market. Each team must submit three items for scoring: (1) The team s product brochure. (2) A photo of the team s booth. (3) The team s evaluation and purchase report. Product Tradeshow Success: 80 Percent Scoring is based on product quality ranking by experts in the market, and success in the market product sales. Product Evaluation: 20 Percent Scoring is based on the team s rationale in applying the criteria to products in its product selection decision-making Tradeshow Evaluation Criteria (Overall criterion) 1. How well does this product deliver business value to its customers? (Criteria based on ISO/IEC Information Security Risk Management) 2. What kinds of organizations are vulnerable to these risks? 3. How prevalent are these risks? 4. How effective is the product in its treatment of these risks? 5. How difficult is it to acquire? What is the installation and training burden? 6. Does the product enable monitoring and review of its effectiveness? (Criteria based on ISO/IEC Requirements for bodies providing audit and certification of information security management systems) 7. Does the operation of this product require new/additional competencies in the organization or its auditors? 8. Does the product support certification of its performance (or security/privacy performance)? (Criteria based on ISO/IEC Code of practice for information security management) 9. Does the product fit needs for controls that are essential and/or common practice? E.g., a. Legislatively essential information security controls: i. data protection and privacy of personal information (see ); ii. protection of organizational records (see ); iii. intellectual property rights (see ). Page 2 of 5
3 b. Common practice information security controls: i. information security policy document (see 5.1.1); ii. allocation of information security responsibilities (see 6.1.3); iii. information security awareness, education, and training (see 8.2.2); iv. correct processing in applications (see 12.2); v. technical vulnerability management (see 12.6); vi. business continuity management (see 14); vii. management of information security incidents and improvements (see 13.2). 10. Does the product treat the best categories of information security and privacy controls for the situation? a. Security Policy b. Organization of Information Security c. Human Resources Security d. Asset Management e. Access Control f. Cryptography g. Physical And Environmental Security h. Operations security i. Communications Security j. Information Systems Acquisition, Development, Maintenance k. Supplier Relationships l. Information Security Incident management m. Information Security Aspects of Business Continuity n. Compliance (Criterion based on immediate problem) 11. How effective would this product be for treating your team s Jashopper Threat Scenario? Page 3 of 5
4 Team Evaluation and Purchase Report Team Name: Team Members: Products Purchased (Order is not significant): (1) (2) (3) Product Name Vending Team Name Rationale for selecting these three products: Comments on products usefulness for your Jashopper threat scenario: Page 4 of 5
5 Team s Vendor Product Ranking Team Name Ranking Reason Page 5 of 5
ISO 27002:2013 Version Change Summary
Information Shield www.informationshield.com 888.641.0500 sales@informationshield.com Information Security Policies Made Easy ISO 27002:2013 Version Change Summary This table highlights the control category
More informationNABET Criteria for INFORMATION SECURITY MANAGEMENT SYSTEMS (ISMS) Lead Auditor Training Courses
NABET Criteria for INFORMATION SECURITY MANAGEMENT SYSTEMS (ISMS) Lead Auditor Training Courses - 0 - Section 1: INTRODUCTION 1.1 This auditor/lead auditor training course shall provide training for potential
More information^H 3RD EDITION ITGOVERNANCE A MANAGER'S GUIOE TO OATA SECURITY ANO DS 7799/IS017799 ALAN CALDER STEVE WATKINS. KOGAN PAGE London and Sterling, VA
^H 3RD EDITION ITGOVERNANCE A MANAGER'S GUIOE TO OATA SECURITY ANO DS 7799/IS017799 ALAN CALDER STEVE WATKINS KOGAN PAGE London and Sterling, VA Contents Foreword by Nigel Turnbull How to use this book
More informationINFORMATION SYSTEMS. Revised: August 2013
Revised: August 2013 INFORMATION SYSTEMS In November 2011, The University of North Carolina Information Technology Security Council [ITSC] recommended the adoption of ISO/IEC 27002 Information technology
More informationCompliance Services CONSULTING. Gap Analysis. Internal Audit
Compliance Services Gap Analysis The gap analysis is a fast track assessment to establish understanding on an organization s current capabilities. The purpose of this step is to evaluate the current capabilities
More informationInformation Technology Security Program
Information Technology Security Program Office of the CIO December, 2008 1 AGENDA What is it? Why do we need it? An international Standard Program Components Current Status Next Steps 2 What is It? A Policy
More informationSecurity Controls What Works. Southside Virginia Community College: Security Awareness
Security Controls What Works Southside Virginia Community College: Security Awareness Session Overview Identification of Information Security Drivers Identification of Regulations and Acts Introduction
More informationDokument Nr. 521.dw Ausgabe Februar 2013, Rev. 01. . Seite 1 von 11. 521d Seite 1 von 11
Eidgenössisches Departement für Wirtschaft, Bildung und Forschung WBF Staatssekretariat für Wirtschaft SECO Schweizerische Akkreditierungsstelle SAS Checkliste für die harmonisierte Umsetzung der Anforderungen
More informationNEC s Efforts for Security NEC s Security Solution and Trend of Security Consulting Business
NEC s Efforts for Security NEC s Security Solution and Trend of Security Consulting Business By Masashi SUGIURA* This paper is intended to summarize the security solutions of NEC together with the present
More information(Instructor-led; 3 Days)
Information Security Manager: Architecture, Planning, and Governance (Instructor-led; 3 Days) Module I. Information Security Governance A. Introduction to Information Security Governance B. Overview of
More informationInformation Security Management System (ISMS) Overview. Arhnel Klyde S. Terroza
Information Security Management System (ISMS) Overview Arhnel Klyde S. Terroza May 12, 2015 1 Arhnel Klyde S. Terroza CPA, CISA, CISM, CRISC, ISO 27001 Provisional Auditor Internal Auditor at Clarien Bank
More informationSRA International Managed Information Systems Internal Audit Report
SRA International Managed Information Systems Internal Audit Report Report #2014-03 June 18, 2014 Table of Contents Executive Summary... 3 Background Information... 4 Background... 4 Audit Objectives...
More informationI S O I E C 2 7 0 0 2 2 0 1 3 I N F O R M A T I O N S E C U R I T Y A U D I T T O O L
15.1 ESTABLISH SECURITY AGREEMENTS WITH SUPPLIERS 15.1.1 EXPECT SUPPLIERS TO COMPLY WITH RISK MITIGATION AGREEMENTS Do you clarify the information security risks that exist whenever your suppliers have
More informationDepartment of Information Systems and Cyber Security
The University of Texas at San Antonio 1 Department of Information Systems and Cyber Security All graduate programs in Information Systems and Cyber Security are accredited by AACSB International The Association
More informationBellevue University Cybersecurity Programs & Courses
Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320
More informationNETS for Students: Extended Rubric for Grades 6 8
DRAFT (September 7, 2004) Purpose: This draft version of the NETS extended rubric for Grades 6 8 is available online for educational technology professionals to review and provide feedback to the developers.
More informationEDUCORE ISO 20000 Expert Training
EDUCORE ISO 20000 Expert Training Overview ISO/IEC 20000 is the first international standard for IT service management. It was developed in 2005, by ISO/IEC JTC1 SC7 and revised in 2011. ISO/IEC 20000-1:2005
More informationComprehensive Risk Assessment and Developing the Audit Plan
Comprehensive Risk Assessment and Developing the Audit Plan Laure Boyd, CIA, CGAP Internal Audit Manager Leon County Clerk of the Circuit Court and Comptroller Our Time Today Background Risk Assessment
More informationSecurity Engineering Best Practices. Arca Systems, Inc. 8229 Boone Blvd., Suite 750 Vienna, VA 22182 703-734-5611 ferraiolo@arca.com.
Tutorial: Instructor: Topics: Biography: Security Engineering Best Practices Karen Ferraiolo, Arca Systems, Inc. 8229 Boone Blvd., Suite 750 Vienna, VA 22182 703-734-5611 ferraiolo@arca.com This tutorial
More informationMicrosoft s Compliance Framework for Online Services
Microsoft s Compliance Framework for Online Services Online Services Security and Compliance Executive summary Contents Executive summary 1 The changing landscape for online services compliance 4 How Microsoft
More informationHow To Implement Data Loss Prevention
Data Loss Prevention Implementation Initiatives THE HITACHI WAY White Paper By HitachiSoft America Security Solutions Group September, 2009 HITACHI SOFTWARE ENGINEERING AMERICA, LTD. Executive Summary
More informationRichard Gadsden Information Security Office Office of the CIO Information Services
Information Security Compliance System Owner Training Richard Gadsden Information Security Office Office of the CIO Information Services Sharon Knowles Information Assurance Compliance MUSC Medical Center
More informationRESEARCH PAPERS FACULTY OF MATERIALS SCIENCE AND TECHNOLOGY IN TRNAVA SLOVAK UNIVERSITY OF TECHNOLOGY IN BRATISLAVA
RESEARCH PAPERS FACULTY OF MATERIALS SCIENCE AND TECHNOLOGY IN TRNAVA SLOVAK UNIVERSITY OF TECHNOLOGY IN BRATISLAVA 2012 Special Number QUALITY IN SERVICE MANAGEMENT SYSTEM ACCORDING TO ISO 20000 Ružena
More informationISO/IEC 27002:2013 WHITEPAPER. When Recognition Matters
When Recognition Matters WHITEPAPER ISO/IEC 27002:2013 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS www.pecb.com CONTENT 3 4 5 6 6 7 7 7 7 8 8 8 9 9 9
More informationInformation Security Management System for Microsoft s Cloud Infrastructure
Information Security Management System for Microsoft s Cloud Infrastructure Online Services Security and Compliance Executive summary Contents Executive summary 1 Information Security Management System
More informationRecent Researches in Electrical Engineering
The importance of introducing Information Security Management Systems for Service Providers Anel Tanovic*, Asmir Butkovic **, Fahrudin Orucevic***, Nikos Mastorakis**** * Faculty of Electrical Engineering
More informationI. PREREQUISITES For information regarding prerequisites for this course, please refer to the Academic Course Catalog.
Note: Course content may be changed, term to term, without notice. The information below is provided as a guide for course selection and is not binding in any form, and should not be used to purchase course
More informationUsage of OPNET IT tool to Simulate and Test the Security of Cloud under varying Firewall conditions
Usage of OPNET IT tool to Simulate and Test the Security of Cloud under varying Firewall conditions GRADUATE PROJECT REPORT Submitted to the Faculty of The School of Engineering & Computing Sciences Texas
More informationSymantec Cyber Security Services: A Recipe for Disaster
When On-The-Job Training Is a Recipe for Disaster How security simulation prepares IT staff for APTs, breaches and data leakages Contents Sometimes On-The-Job Training Is a Lousy Idea... 2 On-The-Job Training
More informationMARKETING KUNG FU: 25 Things. Every Marketing Department Needs. Use this checklist as a guide or as a starting point for your complete marketing plan.
MARKETING KUNG FU: 25 Things Every Marketing Department Needs Use this checklist as a guide or as a starting point for your complete marketing plan. 1 Your Business Plan How big is your market opportunity?
More informationChapter 2 INDUSTRIAL BUYING BEHAVIOUR: DECISION MAKING IN PURCHASING
Chapter 1 THE ROLE OF PURCHASING IN THE VALUE CHAIN The role and importance of the purchasing and supply function in the value chain. The difference between concepts such as ordering, buying, purchasing,
More informationPII Compliance Guidelines
Personally Identifiable Information (PII): Individually identifiable information from or about an individual customer including, but not limited to: (a) a first and last name or first initial and last
More informationI. PREREQUISITES For information regarding prerequisites for this course, please refer to the Academic Course Catalog.
Note: Course content may be changed, term to term, without notice. The information below is provided as a guide for course selection and is not binding in any form, and should not be used to purchase course
More informationRARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY 229 Information Security Fundamentals
RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE CISY 229 Information Security Fundamentals I. Basic Course Information A. Course Number & Title: CISY-229 Information Security Fundamentals B. New or Modified
More informationCyber Security Consultancy Standard. Version 0.2 Crown Copyright 2015 All Rights Reserved. Page 1 of 13
Cyber Security Consultancy Standard Version 0.2 Crown Copyright 2015 All Rights Reserved Page 1 of 13 Contents 1. Overview... 3 2. Assessment approach... 4 3. Requirements... 5 3.1 Service description...
More informationCore Monitoring Guide
Core Monitoring Guide April 2005 eta UNITED STATES DEPARTMENT OF LABOR EMPLOYMENT AND TRAINING ADMINISTRATION Core Monitoring Guide April 2005 United States Department of Labor Employment and Training
More informationHealth Science Education II, August 2013, Page 1 of 5
Indiana Department of Education Indiana Academic Course Framework HEALTH SCIENCE EDUCATION II Health Science Education II is an extended laboratory experience at the student's choice of clinical site designed
More informationADRIAN DAVIS INFORMATION SECURITY FORUM
Securing the Supply Chain: Guide to Risk Management ADRIAN DAVIS INFORMATION SECURITY FORUM Session ID: GRC-201B Session Classification: Intermediate Introduction Introduction Presentation based on research
More informationCIS 523/423 Disaster Recovery Business Continuity
CIS 523/423 Disaster Recovery Business Continuity Course Description A study of disaster recovery and business continuity as related to the information technology function in organizations. Topics will
More informationOCCUPATIONAL GROUP: Information Technology. CLASS FAMILY: Security CLASS FAMILY DESCRIPTION:
OCCUPATIONAL GROUP: Information Technology CLASS FAMILY: Security CLASS FAMILY DESCRIPTION: This family of positions provides security and monitoring for the transmission of information in voice, data,
More informationISM527 - Cyber Security Management
ISM527 - Cyber Security Management Credit Hours: 3 Contact Hours: This is a 3-credit course, offered in accelerated format. This means that 16 weeks of material is covered in 8 weeks. The exact number
More informationTABLE OF CONTENTS CHAPTER TITLE PAGE
viii TABLE OF CONTENTS CHAPTER TITLE PAGE TITLE PAGE DECLARATION DEDICATION ACKNOWLEDGEMENT ABSTRACT ABSTRAK TABLE OF CONTENTS LIST OF TABLES LIST OF FIGURES LIST OF APPENDICES I II III IV VI VII VIII
More informationDelphi Information 3 rd Party Security Requirements Summary. Classified: Public 5/17/2012. Page 1 of 11
Delphi Information 3 rd Party Security Requirements Summary Classified: Public 5/17/2012 Page 1 of 11 Contents Introduction... 3 Summary for All Users... 4 Vendor Assessment Considerations... 7 Page 2
More informationInformation Security Management Systems. Chief Operating Officer, Director of Strategy and Business Development, Chief Information Security Officer
Information Security Management Systems Chief Operating Officer, Director of Strategy and Business Development, Chief Information Security Officer atsec information security, 2013 ISO/IEC 27001 and related
More informationPAPER-6 PART-5 OF 5 CA A.RAFEQ, FCA
Chapter-4: Business Continuity Planning and Disaster Recovery Planning PAPER-6 PART-5 OF 5 CA A.RAFEQ, FCA Learning Objectives 2 To understand the concept of Business Continuity Management To understand
More informationSafe Passage Online Training Overview. Objectives
Safe Passage Online Training Overview Copyright 2012 Safe Passage International, Inc. All rights reserved. Identify the features and benefits of the Safe Passage Training Management System (TMS). Explain
More informationTo order the book click on the link, http://www.nelsonbrain.com/shop/micro/oap-hrpa6
Recruitment and Selection Author: Professor Mary Jo Ducharme, School of Human Resources Management York University Required Text: V.M. Catano, W.H. Wiesner, R.D. Hackett, L.L. Methot., Recruitment and
More informationCautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work
Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work Security concerns and dangers come both from internal means as well as external. In order to enhance your security posture
More informationITM 641: Information Security Policies Syllabus Sanjay Goel School of Business University at Albany, State University of New York
INSTRUCTOR INFORMATION Name: Sanjay Goel Email: goel@albany.edu Phone: (518) 442-4925 Office Location: BA 310b, University at Albany Office Hours: TBD CLASS INFORMATION Time: N/A Location: Online Dates:
More informationMarketing Services California Master Services Agreement Business Management Consulting Services No. 5-06-99-41 to December 30, 2009
Table of Contents (Click on topic to go directly to that section.) Marketing Services 2 Marketing/Public Relations Plans, Analysis, and Development Market and/or Research Surveys Multi-media Production
More informationSchool Library Standards. for California Public Schools, Grades Nine through Twelve
School Library Standards for California Public Schools, Grades Nine through Twelve STANDARD 1 Students Access Information The student will access information by applying knowledge of the organization of
More informationCentral Agency for Information Technology
Central Agency for Information Technology Kuwait National IT Governance Framework Information Security Agenda 1 Manage security policy 2 Information security management system procedure Agenda 3 Manage
More informationMaster of Science in Information Security and Assurance
Master of Science in Information Security and Assurance The Master of Science in Information Security and Assurance is a competency-based degree program that encompasses the 10 security domains that are
More informationND BUSINESS EDUCATION FRAMEWORKS. Entrepreneurial
ND BUSINESS EDUCATION FRAMEWORKS Entrepreneurship Course Code Course Name/Description Grade Levels Accreditation Time/Credit 14111 Entrepreneurship is a course designed to provide students with the skills
More informationINDIVIDUAL MASTERY for: St#: 1153366 Test: CH 9 Acceleration Test on 29/07/2015 Grade: B Score: 85.37 % (35.00 of 41.00)
INDIVIDUAL MASTERY for: St#: 1153366 Grade: B Score: 85.37 % (35.00 of 41.00) INDIVIDUAL MASTERY for: St#: 1346350 Grade: I Score: 21.95 % (9.00 of 41.00) INDIVIDUAL MASTERY for: St#: 1350672 Grade: A
More informationCyber Security solutions
Cyber Security solutions The scenario IT security has become a highly critical issue for all businesses as a result of the growing pervasiveness and diffusion of ICT technology. Risks can arise both inside
More informationINDIVIDUAL MASTERY for: St#: 1141027 Test: CH 9 Acceleration Test on 09/06/2015 Grade: A Score: 92.68 % (38.00 of 41.00)
INDIVIDUAL MASTERY for: St#: 1141027 Grade: A Score: 92.68 % (38.00 of 41.00) INDIVIDUAL MASTERY for: St#: 1172998 Grade: B Score: 85.37 % (35.00 of 41.00) INDIVIDUAL MASTERY for: St#: 1232138 Grade: B
More informationFour Top Emagined Security Services
Four Top Emagined Security Services. www.emagined.com Emagined Security offers a variety of Security Services designed to support growing security needs. This brochure highlights four key Emagined Security
More informationINTERMEDIATE QUALIFICATION
PROFESSIONAL QUALIFICATION SCHEME INTERMEDIATE QUALIFICATION SERVICE CAPABILITY PLANNING, PROTECTION AND OPTIMIZATION CERTIFICATE SYLLABUS The Swirl logo is a trade mark of the Cabinet Office ITIL is a
More informationOffice Office hours Email/Telephone. Monday: 8:00-9:45 or by appointment. 31-236 CHS Wednesday: 12:00-1PM or by appointment I. SYSTEMATIC EVALUATION
[Version 031816] HPM 422: PRACTICES OF EVALUATION IN HEALTH POLICY & MANAGEMENT Spring 2016, M/W- 10:00-11:50 a.m. Room 33-105, HPM 422 Moodle Site: https://ccle.ucla.edu/course/view/14s-hltpolm422-2 Faculty
More informationISO/IEC 27001:2013 Thema Änderungen der Kontrollen der ISO/IEC 27001:2013 im Vergleich zur Fassung aus 2005 Datum 20.01.2014
ISO/IEC 27001:2013 Thema Änderungen der Kontrollen der ISO/IEC 27001:2013 im Vergleich zur Fassung aus 2005 Datum 20.01.2014 Legende: gering mittel hoch Änderungsgrad A.5 Information security policies
More informationClient Security Risk Assessment Questionnaire
Select the appropriate answer from the drop down in the column, and provide a brief description in the section. 1 Do you have a member of your organization with dedicated information security duties? 2
More informationOffice of the Auditor General Performance Audit Report. Statewide Oracle Database Controls Department of Technology, Management, and Budget
Office of the Auditor General Performance Audit Report Statewide Oracle Database Controls Department of Technology, Management, and Budget March 2015 071-0565-14 State of Michigan Auditor General Doug
More informationAnalysis of Information Security Management Systems at 5 Domestic Hospitals with More than 500 Beds
Original Article Healthc Inform Res. 2010 June;16(2):89-99. pissn 2093-3681 eissn 2093-369X Analysis of Information Security Management Systems at 5 Domestic Hospitals with More than 500 Beds Woo-Sung
More informationCENTRAL TEXAS COLLEGE ITSY 2459 SECURITY ASSESSMENT AND AUDITING. Semester Hours Credit: 4 INSTRUCTOR: OFFICE HOURS:
CENTRAL TEXAS COLLEGE ITSY 2459 SECURITY ASSESSMENT AND AUDITING Semester Hours Credit: 4 INSTRUCTOR: OFFICE HOURS: I. INTRODUCTION A. Capstone experience for the security curriculum. Synthesizes technical
More informationApplication for CISM Certification
Application for CISM Certification 4/2015 Requirements to Become a Certified Information Security Manager become a Certified Information Security Manager (CISM), an applicant must: 1. Score a passing grade
More informationStandards. Interactive Media, July 2012, Page 1 of 6
Indiana Department of Education Academic Course Framework INTERACTIVE MEDIA Interactive Media prepares students for careers in business and industry working with interactive media products and services;
More informationInternet Security Awareness Program in Georgia funded by ISOC Community Grants Programme
Internet Security Awareness Program in Georgia funded by ISOC Community Grants Programme Final Report July, 2011 Prepared by David Tabatadze Project Coordinator info@isap.ge Project Overview With the internet
More informationCompleting an Accounts Payable Audit With ACL (Aired on Feb 15)
AuditSoftwareVideos.com Video Training Titles (ACL Software Sessions Only) Contents Completing an Accounts Payable Audit With ACL (Aired on Feb 15)... 1 Statistical Analysis in ACL The Analyze Menu (Aired
More informationI. PREREQUISITES For information regarding prerequisites for this course, please refer to the Academic Course Catalog.
Note: Course content may be changed, term to term, without notice. The information below is provided as a guide for course selection and is not binding in any form, and should not be used to purchase course
More informationI. Introduction to Privacy: Common Principles and Approaches
I. Introduction to Privacy: Common Principles and Approaches A. A Modern History of Privacy a. Descriptions and definitions b. Historical and social origins c. Information types i. Personal and non-personal
More informationReduce risk. Reduce cost. Raise performance.
Reduce risk. Reduce cost. Raise performance. Services for professional procurement. Be better informed, make better decisions. Achilles procurement toolkit Support for sourcing and supplier management
More informationWebsite Marketing Audit. Example, inc. Website Marketing Audit. For. Example, INC. Provided by
Website Marketing Audit For Example, INC Provided by State of your Website Strengths We found the website to be easy to navigate and does not contain any broken links. The structure of the website is clean
More informationSHARED ASSESSMENTS PROGRAM STANDARD INFORMATION GATHERING (SIG) QUESTIONNAIRE 2014 MAPPING TO OCC GUIDANCE (2013-29) ON THIRD PARTY RELATIONSHIPS
SHARED ASSESSMENTS PROGRAM STANDARD INFORMATION GATHERING (SIG) QUESTIONNAIRE 2014 MAPPING TO OCC GUIDANCE (2013-29) ON THIRD PARTY RELATIONSHIPS An overview of how the Shared Assessments Program SIG 2014
More informationGuide to. event marketing & trade show display strategies. www.nationalevent.com. www.outdooradventureshow.ca
Guide to event marketing & trade show display strategies This guide is brought to you by: For a complete show schedule please visit: www.outdooradventureshow.ca The return on your investment in consumer
More informationHow is Lead Scoring Implemented? Implementing lead scoring policies is done in three phases:
Lead Scoring What is Lead Scoring? Simply put, lead scoring is an automated way to qualify leads. Successful companies have proven that focusing on quality vs. quantity of leads is an optimal strategy.
More informationGoals. Understanding security testing
Getting The Most Value From Your Next Network Penetration Test Jerald Dawkins, Ph.D. True Digital Security p. o. b o x 3 5 6 2 3 t u l s a, O K 7 4 1 5 3 p. 8 6 6. 4 3 0. 2 5 9 5 f. 8 7 7. 7 2 0. 4 0 3
More informationNABET Criteria for OH&S Lead Auditor Training Course
NABET Criteria for OH&S Lead Auditor Training Course - 0 - Section 1: INTRODUCTION 1.1 The primary focus of the auditor/lead auditor training course shall be on training students to audit Occupational
More informationWhite paper. Secure Cloud Services: An Integrated Approach
White paper Secure Cloud Services: An Integrated Approach Edition October 2013 Whitepaper Information Management Secure Cloud Services: An Integrated Approach Edition October 2013 Copyright 2013 EXIN All
More informationAssignments and Activities for Online Courses
Assignments and Activities for Online Courses We encourage you to take full advantage of the possibilities suggested by the online environment and to experiment with new approaches to student learning.
More informationFINAL DOCUMENT. Guidelines for Regulatory Auditing of Quality Management Systems of Medical Device Manufacturers Part 1: General Requirements
GHTF/SG4/N28R4:2008 FINAL DOCUMENT Title: Guidelines for Regulatory Auditing of Quality Management Systems of Medical Device Manufacturers Authoring Group: GHTF Study Group 4 Endorsed by: The Global Harmonization
More informationHealthcare Technology Audit Basics. Session Objectives
Healthcare Technology Audit Basics Jennifer McGill, CIA, CISA, CGEIT April 20, 2015 Session Objectives Review information technology basic concepts. Use real world examples to identify and understand healthcare
More information3/17/2015. Healthcare Technology Audit Basics. Session Objectives. Jennifer McGill, CIA, CISA, CGEIT April 20, 2015
Healthcare Technology Audit Basics Jennifer McGill, CIA, CISA, CGEIT April 20, 2015 Session Objectives Review information technology basic concepts. Use real world examples to identify and understand healthcare
More informationTEACHER CERTIFICATION STUDY GUIDE INFORMATION ACCESS AND DELIVERY IN THE LIBRARY MEDIA PROGRAM
Table of Contents SUBAREA I. COMPETENCY 1.0 INFORMATION ACCESS AND DELIVERY IN THE LIBRARY MEDIA PROGRAM UNDERSTAND THE MISSION OF THE LIBRARY MEDIA PROGRAM AND THE ROLES AND RESPONSIBILITIES OF THE MEDIA
More informationMAR 4625, Direct Marketing Course Syllabus. Course Description. Course Textbook. Course Learning Outcomes. Credits.
MAR 4625, Direct Marketing Course Syllabus Course Description An overview of direct marketing with an emphasis on database marketing, customer relationship marketing, and response-driven marketing. Provides
More informationI. PREREQUISITE For information regarding prerequisites for this course, please refer to the Academic Course Catalog.
Note: Course content may be changed, term to term, without notice. The information below is provided as a guide for course selection and is not binding in any form, and should not be used to purchase course
More informationExternal Supplier Control Requirements
External Supplier Control s Cyber Security For Suppliers Categorised as Low Cyber Risk 1. Asset Protection and System Configuration Barclays Data and the assets or systems storing or processing it must
More information3 Setting Accounting Defaults
3 Setting Accounting Defaults In Chapter 3 of Computer Accounting Essentials with QuickBooks Online Plus Edition, you will learn how to set defaults. Defaults are information or commands that the software
More informationCESG Certification of Cyber Security Training Courses
CESG Certification of Cyber Security Training Courses Supporting Assessment Criteria for the CESG Certified Training (CCT) Scheme Portions of this work are copyright The Institute of Information Security
More informationURPL- GP.4611 Intelligent Cities: Technology, Policy and Planning
Revised 7 April 2015 Spring 2015 URPL- GP.4611 Intelligent Cities: Technology, Policy and Planning Fridays, 9:15 10:55am Global Center for Academic & Spiritual Life, 238 Thompson Street, Room 265 March
More informationSecurity Standards. 17.1 BS7799 and ISO17799
17 Security Standards Over the past 10 years security standards have come a long way from the original Rainbow Book series that was created by the US Department of Defense and used to define an information
More informationGovernance, Risk, and Compliance (GRC) White Paper
Governance, Risk, and Compliance (GRC) White Paper Table of Contents: Purpose page 2 Introduction _ page 3 What is GRC _ page 3 GRC Concepts _ page 4 Integrated Approach and Methodology page 4 Diagram:
More informationTechno Security's Guide to Securing SCADA
Techno Security's Guide to Securing SCADA Foreword xxiii Chapter 1 Physical Security: SCADA and the Critical Infrastructure's Biggest Vulnerability 1 Introduction 2 Key Control 3 Check All Locks for Proper
More informationMED_INF 403-DL: Introduction to Medical Informatics Fall 2011
Dr. David Levine david-levine-0@northwestern.edu Office Phone: 312-775-4244 between 9 a.m. and 3 p.m. Monday through Friday. Office Hours: By appointment (day and evening available). Course Description
More informationNew York StartUP! 2013 Business Plan Competition Company Profile
New York StartUP! 2013 Business Plan Competition Company Profile Company Name: Year Founded: Contact Name: Address: City State Zip: Target Market: Customer Problem: Email: p: f: URL: Industry: # Employees:
More informationProposed Syllabus by C.S.J.M.University,Kanpur. Bachelors of Computer Application
BCA-S307 Computer Network Security 4 0 0 4 Introduction: Attack, Services and Mechanism, Model for Internetwork Security. Cryptography: Notion of Plain Text, Encryption, Key, Cipher Text, Decryption and
More informationNEOSHO COUNTY COMMUNITY COLLEGE MASTER COURSE SYLLABUS. Division: Applied Science (AS) Liberal Arts (LA) Workforce Development (WD)
NEOSHO COUNTY COMMUNITY COLLEGE MASTER COURSE SYLLABUS COURSE IDENTIFICATION Course Code/Number: ETEC 275 Course Title: Computer and Network Security Division: Applied Science (AS) Liberal Arts (LA) Workforce
More informationTOP 10 Security Questions Introduction Breaches and other privacy and security incidents in healthcare are on the rise due to the vast size of the industry and the oneoffs of protected health information
More information