Information Technology Security and Risk Management
Inductive Cases for Information Security
Herausgeber: Wingreen, Stephen C; Samandari, Amelia
Information Technology Security and Risk Management
Inductive Cases for Information Security
Herausgeber: Wingreen, Stephen C; Samandari, Amelia
- Gebundenes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Information Technology Security and Risk Management: Inductive Cases for Information Security is a compilation of cases that examine recent developments and issues that are relevant to IT security managers, risk assessment and management, and the broader topic of IT security in the 21st century.
Andere Kunden interessierten sich auch für
- James BoneCognitive Risk141,99 €
- Andrew JenkinsonStuxnet to Sunburst152,99 €
- Arun SoniThe Cybersecurity Self-Help Guide152,99 €
- Stephen FriedMobile Device Security98,99 €
- Nikki RobinsonMind the Tech Gap145,99 €
- Ubiquitous and Transparent Security152,99 €
- Bongsik ShinA Practical Introduction to Enterprise Network and Security Management141,99 €
-
-
-
Information Technology Security and Risk Management: Inductive Cases for Information Security is a compilation of cases that examine recent developments and issues that are relevant to IT security managers, risk assessment and management, and the broader topic of IT security in the 21st century.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Taylor & Francis Ltd (Sales)
- Seitenzahl: 318
- Erscheinungstermin: 16. Mai 2024
- Englisch
- Abmessung: 234mm x 156mm x 19mm
- Gewicht: 640g
- ISBN-13: 9781032206141
- ISBN-10: 1032206144
- Artikelnr.: 70149417
- Verlag: Taylor & Francis Ltd (Sales)
- Seitenzahl: 318
- Erscheinungstermin: 16. Mai 2024
- Englisch
- Abmessung: 234mm x 156mm x 19mm
- Gewicht: 640g
- ISBN-13: 9781032206141
- ISBN-10: 1032206144
- Artikelnr.: 70149417
Steven Wingreen is an Associate Professor of Information Systems and Decision Sciences at the University of Canterbury in Christchurch, New Zealand. Prior to his academic career, he was a manager of networks and telecommunications whose responsibilities included network security. He has taught IT security and risk management over the span of his 23-year teaching career at multiple universities, both as a component of more comprehensive courses and as its own course. His current research agenda on the topic of emerging technologies in 21st century commerce includes a project with multiple papers about information privacy, trust, and ethical concerns in the context of advanced emerging technologies.
SECTION 1. TECHNICAL CASES
TEACHING CASES
1.1. Data Breach at Nintendo Co. Ltd.: 300
000 Nintendo Users Hacked
1.2. Target Corporation
1.3. Case Study: Cyber-attack on Ukrainian Power Grid
1.4. Capital One Data Breach
1.5. LinkedIn Data Hack
1.6. Zoombombing: A Technical Perspective
1.7. Case Study: Ransomware Attack on IT Firm Collabera
1.8. Neuralink: A Neural Technology Company
1.9. Securing the Internet of Things
RESEARCH CASES
1.10. Connected Vehicles: An Era of Communications Technologies
Cybersecurity
and Innovation
1.11. SilverPush: A Case of Convenience versus Privacy
SECTION 2. BEHAVIORAL AND SOCIAL CASES
TEACHING CASES
2.1. Microsoft 365 Phishing Case
2.2. Internet of Things Security: Trend Micro Experiment
2.3. 2014 Cyber-attack on eBay Case Study Analysis
2.4. Internal Revenue Service Scams
2.5. International Student Scams
2.6. Security and Privacy Risk with Social Robotics
2.7. Financial Fraud (IS System Controls) at NCL Ltd
2.8. When You Can't Believe What You See or Hear
2.9. Robots: Attack Vectors and Safeguards
2.10. Ransomware: Hollywood Presbyterian Medical Center
2.11. Fast Food Phishing: Cyber Espionage
2.12. Workplace Robots
RESEARCH CASES
2.13. Facial Recognition: Legal
Ethical
and Cultural Concerns
2.14. Aadhaar: The National Identity System of India
SECTION 3. PROCESS CASES
TEACHING CASES
3.1. NHS: COVID-19 Research Ethics and Governance
3.2. Marriot Data Breach: A Case Study Analysis
3.3. ChoicePoint
3.4. TJX
3.5. Case Study: A Data Breach on Flipboard
3.6. What Happens in Vegas: Breach of Data Confidentiality
3.7. PIH Health Phishing
3.8. Biometric Protection and Security: A Case Study on Clearview AI
3.9. Zoombombing: A Business Process Perspective
3.10. Security in the Healthcare Sector
3.11. eBay Hack
3.12. Using AI to Maintain Security of Healthcare Systems
RESEARCH CASES
3.13. Digital Identity Theft Using Deepfakes
TEACHING CASES
1.1. Data Breach at Nintendo Co. Ltd.: 300
000 Nintendo Users Hacked
1.2. Target Corporation
1.3. Case Study: Cyber-attack on Ukrainian Power Grid
1.4. Capital One Data Breach
1.5. LinkedIn Data Hack
1.6. Zoombombing: A Technical Perspective
1.7. Case Study: Ransomware Attack on IT Firm Collabera
1.8. Neuralink: A Neural Technology Company
1.9. Securing the Internet of Things
RESEARCH CASES
1.10. Connected Vehicles: An Era of Communications Technologies
Cybersecurity
and Innovation
1.11. SilverPush: A Case of Convenience versus Privacy
SECTION 2. BEHAVIORAL AND SOCIAL CASES
TEACHING CASES
2.1. Microsoft 365 Phishing Case
2.2. Internet of Things Security: Trend Micro Experiment
2.3. 2014 Cyber-attack on eBay Case Study Analysis
2.4. Internal Revenue Service Scams
2.5. International Student Scams
2.6. Security and Privacy Risk with Social Robotics
2.7. Financial Fraud (IS System Controls) at NCL Ltd
2.8. When You Can't Believe What You See or Hear
2.9. Robots: Attack Vectors and Safeguards
2.10. Ransomware: Hollywood Presbyterian Medical Center
2.11. Fast Food Phishing: Cyber Espionage
2.12. Workplace Robots
RESEARCH CASES
2.13. Facial Recognition: Legal
Ethical
and Cultural Concerns
2.14. Aadhaar: The National Identity System of India
SECTION 3. PROCESS CASES
TEACHING CASES
3.1. NHS: COVID-19 Research Ethics and Governance
3.2. Marriot Data Breach: A Case Study Analysis
3.3. ChoicePoint
3.4. TJX
3.5. Case Study: A Data Breach on Flipboard
3.6. What Happens in Vegas: Breach of Data Confidentiality
3.7. PIH Health Phishing
3.8. Biometric Protection and Security: A Case Study on Clearview AI
3.9. Zoombombing: A Business Process Perspective
3.10. Security in the Healthcare Sector
3.11. eBay Hack
3.12. Using AI to Maintain Security of Healthcare Systems
RESEARCH CASES
3.13. Digital Identity Theft Using Deepfakes
SECTION 1. TECHNICAL CASES
TEACHING CASES
1.1. Data Breach at Nintendo Co. Ltd.: 300
000 Nintendo Users Hacked
1.2. Target Corporation
1.3. Case Study: Cyber-attack on Ukrainian Power Grid
1.4. Capital One Data Breach
1.5. LinkedIn Data Hack
1.6. Zoombombing: A Technical Perspective
1.7. Case Study: Ransomware Attack on IT Firm Collabera
1.8. Neuralink: A Neural Technology Company
1.9. Securing the Internet of Things
RESEARCH CASES
1.10. Connected Vehicles: An Era of Communications Technologies
Cybersecurity
and Innovation
1.11. SilverPush: A Case of Convenience versus Privacy
SECTION 2. BEHAVIORAL AND SOCIAL CASES
TEACHING CASES
2.1. Microsoft 365 Phishing Case
2.2. Internet of Things Security: Trend Micro Experiment
2.3. 2014 Cyber-attack on eBay Case Study Analysis
2.4. Internal Revenue Service Scams
2.5. International Student Scams
2.6. Security and Privacy Risk with Social Robotics
2.7. Financial Fraud (IS System Controls) at NCL Ltd
2.8. When You Can't Believe What You See or Hear
2.9. Robots: Attack Vectors and Safeguards
2.10. Ransomware: Hollywood Presbyterian Medical Center
2.11. Fast Food Phishing: Cyber Espionage
2.12. Workplace Robots
RESEARCH CASES
2.13. Facial Recognition: Legal
Ethical
and Cultural Concerns
2.14. Aadhaar: The National Identity System of India
SECTION 3. PROCESS CASES
TEACHING CASES
3.1. NHS: COVID-19 Research Ethics and Governance
3.2. Marriot Data Breach: A Case Study Analysis
3.3. ChoicePoint
3.4. TJX
3.5. Case Study: A Data Breach on Flipboard
3.6. What Happens in Vegas: Breach of Data Confidentiality
3.7. PIH Health Phishing
3.8. Biometric Protection and Security: A Case Study on Clearview AI
3.9. Zoombombing: A Business Process Perspective
3.10. Security in the Healthcare Sector
3.11. eBay Hack
3.12. Using AI to Maintain Security of Healthcare Systems
RESEARCH CASES
3.13. Digital Identity Theft Using Deepfakes
TEACHING CASES
1.1. Data Breach at Nintendo Co. Ltd.: 300
000 Nintendo Users Hacked
1.2. Target Corporation
1.3. Case Study: Cyber-attack on Ukrainian Power Grid
1.4. Capital One Data Breach
1.5. LinkedIn Data Hack
1.6. Zoombombing: A Technical Perspective
1.7. Case Study: Ransomware Attack on IT Firm Collabera
1.8. Neuralink: A Neural Technology Company
1.9. Securing the Internet of Things
RESEARCH CASES
1.10. Connected Vehicles: An Era of Communications Technologies
Cybersecurity
and Innovation
1.11. SilverPush: A Case of Convenience versus Privacy
SECTION 2. BEHAVIORAL AND SOCIAL CASES
TEACHING CASES
2.1. Microsoft 365 Phishing Case
2.2. Internet of Things Security: Trend Micro Experiment
2.3. 2014 Cyber-attack on eBay Case Study Analysis
2.4. Internal Revenue Service Scams
2.5. International Student Scams
2.6. Security and Privacy Risk with Social Robotics
2.7. Financial Fraud (IS System Controls) at NCL Ltd
2.8. When You Can't Believe What You See or Hear
2.9. Robots: Attack Vectors and Safeguards
2.10. Ransomware: Hollywood Presbyterian Medical Center
2.11. Fast Food Phishing: Cyber Espionage
2.12. Workplace Robots
RESEARCH CASES
2.13. Facial Recognition: Legal
Ethical
and Cultural Concerns
2.14. Aadhaar: The National Identity System of India
SECTION 3. PROCESS CASES
TEACHING CASES
3.1. NHS: COVID-19 Research Ethics and Governance
3.2. Marriot Data Breach: A Case Study Analysis
3.3. ChoicePoint
3.4. TJX
3.5. Case Study: A Data Breach on Flipboard
3.6. What Happens in Vegas: Breach of Data Confidentiality
3.7. PIH Health Phishing
3.8. Biometric Protection and Security: A Case Study on Clearview AI
3.9. Zoombombing: A Business Process Perspective
3.10. Security in the Healthcare Sector
3.11. eBay Hack
3.12. Using AI to Maintain Security of Healthcare Systems
RESEARCH CASES
3.13. Digital Identity Theft Using Deepfakes