|
QUICK LINKS FOR SINGLE-FILE PPTX DOWNLOADS:
Applied Ethics
Applying Social & Organizational Psychology
Auditing Information Security
E-mail and Internet Use Policies
Identification & Authentication
INFOSEC Update 2006
Intellectual Property Law
Review 2010
Introduction to Cryptology
Introduction to Cyberlaw
Introduction to Database Management System Administration
& Security
Leadership Skills
Management Skills
Managing Employment, Hiring
& Firing
MSIA Review Course -- FUNNY (2006)
Physical & Facilities Security
Solving Problems
Working with Vendors
* * * DESCRIPTIONS * * *
- Ethics in Computing
- What is Ethics
- Why Do We Care about Ethics?
- What’s Special about Computers?
- Steps to Ethical Decision-Making
- The Law and Ethics
- Guidelines
- Ethical Principles
- Deontology (Rights & Duties)
- Professional Duties
- Relation Between Rights and Duties
- Consequentialism
- Kant’s Categorical Imperatives
- Stakeholders
- Beware Disjunction of Costs and
Benefits
- Social Dynamics of Your Group
- How are Your Colleagues Organized?
- What Kinds of Jobs Do Your Colleagues Do?
- How Much Autonomy Do Your Colleagues Have?
- Locus of Control
- Understand Your Colleagues Goals
- Applying Some Fundamental Concepts from Social Psychology
- Attribution Theory
- Social Cognition
- The Schema
- Judgement
- Beliefs and Attitudes
- Prejudice
- Conformity, Compliance and Obedience
- Pro-Social (Helpful) Behavior
- Group Behavior
- Social Loafing
- Group Polarization
- Groupthink
- Personality Types and Social Styles
- Introduction to Auditing
- EDP System Controls
- Responsibility for Control of EDP
- Auditing Computer Applications
- Reporting Audit Results
- Damaging the Reputation of the Enterprise
- Disseminating and Using Incorrect Information
- Hoaxes
- Threats
- Viruses and Other Malicious Code
- Junk E-mail
- Chain Letters and Ponzi Schemes
- Get-Rich-Quick Schemes
- Mail Storms
- Stolen Intellectual Property
- Plagiarism
- Criminal Hacking and Hacktivism
- Online Auctions
- Online Gambling
- Buying on the Web
- Games
- Spyware
- Internet Addiction
- Online Dating and Cybersex
- Hate Groups
- Pornography
- Pedophiles
- Identification and authentication basics
- Forms of authentication
- Passwords
- Tokens
- Biometrics
- Artificial intelligence
INFOSEC UPDATE 2006 lecture notes
This workbook was used in the
two-day workshop held at the MSIA Residency in June 2006 . The PDF file
includes selected abstracts covering the previous 18 months of development
across the field of information assurance. For complete listings of
all abstracts in the INFOSEC YEAR IN REVIEW Database, see the IYIR section of this Web site.
- Basic Concepts &
Terminology
- Types of Algorithm
- Cryptanalysis Methods
- Stronger Encryption
- Asymmetric Encryption & the Public-Key Cryptosystem
- Using PGP
Introduction to Cyberlaw:
S1 W07: Introduction to cyberlaw and jurisdiction
- What is Cyberspace?
- Jurisdiction in Cyberspace
- Contracts
- Defamation
- Key Cybercrime Laws in the USA
S1 W08: Intellectural-property law
- Purpose
- Subject Matter
- What is Protected by Copyright?
- Formalities
- Works Made for Hire
- Contractual Sale
- Infringement
- HTML
- Linking
- Framing
- Scumware
- E-mail
- Criminal Law
- 1st Amendment?
- Fair Use
Intellectual-property law review 2010 PDF notes
- General IP Overview
- Patents
- Trade Secrets
- Copyright
- Discussion
- The Future of IP
Legal Aspects of Investigating
& Prosecuting Computer Crimes PDF notes
- Introduction
- Search Warrants
- Warrantless Seizure of Evidence
- Electronic Crime Scene Investigation
- Analysis of Digital Evidence
- Using Seized Materisla & Results in Evidence
- Part 1: Overview of Database Theory
- Why study DBMS?
- Historical Overview
- DBMS Basics
- Relational DB Theory
- Fundamental Issues in DB Applications
- Part 2: Administration & Concurrency Control
- Database Administration
- Configuration Control
- Documentation
- Concurrency Control
- Atomic Transactions
- Resource Locking
- Consistent Transactions
- Transaction Isolation Level
- Cursor Type
- Part 3: ACID Transactions
- Atomic
- Consistent
- Isolated
- Durable
- Part 4: DB Security & Resource Management
- Database Security
- Processing Rights
- I&A
- Individuals & User Groups
- Application Security
- Database Recovery
- Transactions
- Application Logging
- Transactions and Log Files
- Backups & Log Files
- Recovery from Backups
- Recovery from Log Files
- Resource Management
- Performance
- Inflection points
- Capacity Planning
- Statistical Projections
- Packing Records by Key
- Application Evolution
- Leading Meetings the Infrastructure
- Ground Rules for Meetings
- Presenting Information Effectively
- Analytical Techniques
- Part 1 Understanding Management Styles
- Hawthorne Effect
- Implications of the Hawthorne Effect
- Theory X: Stick & Carrot
- Theory Y (Douglas McGregor)
- Theory Z (Abraham Maslow)
- Maslows Hierarchy of Needs
- Managerial Styles
- Part 2 Good Management Style
- Involved
- Available
- Open
- Supportive
- Fair
- Competent
- Confident
- Consistent
- Realistic
- Organized
- Decisive
- Part 3 Creating and Maintaining a Good Team
- MBO - Management by Objectives
- MBWA - Management by Walking Around
- Walk a Mile in Your Employees' Shoes
- Hire the Best People You Can Find
- Employee Career Development
- What About Losing a Well-Trained Employee?
- How Can We Keep Good Employees?
- Technical Training
- The Redundancy Rule
Series of jokes presented at a graduation ceremony for MSIA students
- What’s the Problem?
- Cases
- Hiring
- Management
- Termination
- Location of building
- Location within building
- Layout
- Doors
- Windows
- Electrical power supply
- Air conditioning
- Electromagnetic radiation
- Fire detection and prevention
- Water damage
- Guards, gates and guns
- Access controls
- Mechanical locks
- Keypads
- Features of electronic access
control systems
- Cards
- Biometric methods
- Set Your Goals
- Get the Global Picture
- Distinguish Observation from
Assumption
- Distinguish Observation from
Hearsay
- Distinguish Observation from
Hypothesis
- Challenge Your Hypothesis
- Track the Details
- RTFM
- Use Bug/Patch Reports
- Vendor Relations
- Establishing Constructive Relationships
- Hardware Support: Vendor
- Hardware Support: 3rd Party
- Hardware Support: Self
- Software Support: Vendors
- Software Support: Clients
- Records are Important
- Problem-Database Design
- Cooperative Problem Resolution
- Problem Escalation
- Multi-Vendor Problems
Copyright © 2023 M. E. Kabay, PhD. All rights
reserved.
The opinions expressed in any of the writings on
this Web site represent the author’s opinions and do not necessarily
represent the opinions or positions of his employers, associates,
colleagues, students, relatives, friends, enemies, cats, dog or plants.
Materials copyrighted by M. E. Kabay from this Website may be freely
used for non-commercial teaching (i.e., specifically in any courses
for academic credit or in free industry training at workshops or within
organizations) but may not be re-posted on any Website or used in
commercial training (where participants must pay fees for participation
in the conference or workshop or where the instructor is paid) without
express written permission. Any unauthorized sale of these copyrighted
materials will be prosecuted to the full extent of the law.
Updated
2023-01-02
|