Information Technology Security and Risk Management (eBook, ePUB)
Inductive Cases for Information Security
Redaktion: Wingreen, Stephen C.; Samandari, Amelia
40,95 €
40,95 €
inkl. MwSt.
Sofort per Download lieferbar
20 °P sammeln
40,95 €
Als Download kaufen
40,95 €
inkl. MwSt.
Sofort per Download lieferbar
20 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
40,95 €
inkl. MwSt.
Sofort per Download lieferbar
Alle Infos zum eBook verschenken
20 °P sammeln
Information Technology Security and Risk Management (eBook, ePUB)
Inductive Cases for Information Security
Redaktion: Wingreen, Stephen C.; Samandari, Amelia
- Format: ePub
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
Information Technology Security and Risk Management: Inductive Cases for Information Security is a compilation of cases that examine recent developments and issues that are relevant to IT security managers, risk assessment and management, and the broader topic of IT security in the 21st century.
- Geräte: eReader
- ohne Kopierschutz
- eBook Hilfe
- Größe: 3.49MB
Information Technology Security and Risk Management: Inductive Cases for Information Security is a compilation of cases that examine recent developments and issues that are relevant to IT security managers, risk assessment and management, and the broader topic of IT security in the 21st century.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Taylor & Francis
- Seitenzahl: 336
- Erscheinungstermin: 16. Mai 2024
- Englisch
- ISBN-13: 9781040018965
- Artikelnr.: 70293781
- Verlag: Taylor & Francis
- Seitenzahl: 336
- Erscheinungstermin: 16. Mai 2024
- Englisch
- ISBN-13: 9781040018965
- Artikelnr.: 70293781
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Steven Wingreen is an Associate Professor of Information Systems and Decision Sciences at the University of Canterbury in Christchurch, New Zealand. Prior to his academic career, he was a manager of networks and telecommunications whose responsibilities included network security. He has taught IT security and risk management over the span of his 23-year teaching career at multiple universities, both as a component of more comprehensive courses and as its own course. His current research agenda on the topic of emerging technologies in 21st century commerce includes a project with multiple papers about information privacy, trust, and ethical concerns in the context of advanced emerging technologies.
SECTION 1. TECHNICAL CASES
TEACHING CASES
1.1. Data Breach at Nintendo Co. Ltd.: 300
000 Nintendo Users Hacked
1.2. Target Corporation
1.3. Case Study: Cyber-attack on Ukrainian Power Grid
1.4. Capital One Data Breach
1.5. LinkedIn Data Hack
1.6. Zoombombing: A Technical Perspective
1.7. Case Study: Ransomware Attack on IT Firm Collabera
1.8. Neuralink: A Neural Technology Company
1.9. Securing the Internet of Things
RESEARCH CASES
1.10. Connected Vehicles: An Era of Communications Technologies
Cybersecurity
and Innovation
1.11. SilverPush: A Case of Convenience versus Privacy
SECTION 2. BEHAVIORAL AND SOCIAL CASES
TEACHING CASES
2.1. Microsoft 365 Phishing Case
2.2. Internet of Things Security: Trend Micro Experiment
2.3. 2014 Cyber-attack on eBay Case Study Analysis
2.4. Internal Revenue Service Scams
2.5. International Student Scams
2.6. Security and Privacy Risk with Social Robotics
2.7. Financial Fraud (IS System Controls) at NCL Ltd
2.8. When You Can't Believe What You See or Hear
2.9. Robots: Attack Vectors and Safeguards
2.10. Ransomware: Hollywood Presbyterian Medical Center
2.11. Fast Food Phishing: Cyber Espionage
2.12. Workplace Robots
RESEARCH CASES
2.13. Facial Recognition: Legal
Ethical
and Cultural Concerns
2.14. Aadhaar: The National Identity System of India
SECTION 3. PROCESS CASES
TEACHING CASES
3.1. NHS: COVID-19 Research Ethics and Governance
3.2. Marriot Data Breach: A Case Study Analysis
3.3. ChoicePoint
3.4. TJX
3.5. Case Study: A Data Breach on Flipboard
3.6. What Happens in Vegas: Breach of Data Confidentiality
3.7. PIH Health Phishing
3.8. Biometric Protection and Security: A Case Study on Clearview AI
3.9. Zoombombing: A Business Process Perspective
3.10. Security in the Healthcare Sector
3.11. eBay Hack
3.12. Using AI to Maintain Security of Healthcare Systems
RESEARCH CASES
3.13. Digital Identity Theft Using Deepfakes
TEACHING CASES
1.1. Data Breach at Nintendo Co. Ltd.: 300
000 Nintendo Users Hacked
1.2. Target Corporation
1.3. Case Study: Cyber-attack on Ukrainian Power Grid
1.4. Capital One Data Breach
1.5. LinkedIn Data Hack
1.6. Zoombombing: A Technical Perspective
1.7. Case Study: Ransomware Attack on IT Firm Collabera
1.8. Neuralink: A Neural Technology Company
1.9. Securing the Internet of Things
RESEARCH CASES
1.10. Connected Vehicles: An Era of Communications Technologies
Cybersecurity
and Innovation
1.11. SilverPush: A Case of Convenience versus Privacy
SECTION 2. BEHAVIORAL AND SOCIAL CASES
TEACHING CASES
2.1. Microsoft 365 Phishing Case
2.2. Internet of Things Security: Trend Micro Experiment
2.3. 2014 Cyber-attack on eBay Case Study Analysis
2.4. Internal Revenue Service Scams
2.5. International Student Scams
2.6. Security and Privacy Risk with Social Robotics
2.7. Financial Fraud (IS System Controls) at NCL Ltd
2.8. When You Can't Believe What You See or Hear
2.9. Robots: Attack Vectors and Safeguards
2.10. Ransomware: Hollywood Presbyterian Medical Center
2.11. Fast Food Phishing: Cyber Espionage
2.12. Workplace Robots
RESEARCH CASES
2.13. Facial Recognition: Legal
Ethical
and Cultural Concerns
2.14. Aadhaar: The National Identity System of India
SECTION 3. PROCESS CASES
TEACHING CASES
3.1. NHS: COVID-19 Research Ethics and Governance
3.2. Marriot Data Breach: A Case Study Analysis
3.3. ChoicePoint
3.4. TJX
3.5. Case Study: A Data Breach on Flipboard
3.6. What Happens in Vegas: Breach of Data Confidentiality
3.7. PIH Health Phishing
3.8. Biometric Protection and Security: A Case Study on Clearview AI
3.9. Zoombombing: A Business Process Perspective
3.10. Security in the Healthcare Sector
3.11. eBay Hack
3.12. Using AI to Maintain Security of Healthcare Systems
RESEARCH CASES
3.13. Digital Identity Theft Using Deepfakes
SECTION 1. TECHNICAL CASES
TEACHING CASES
1.1. Data Breach at Nintendo Co. Ltd.: 300
000 Nintendo Users Hacked
1.2. Target Corporation
1.3. Case Study: Cyber-attack on Ukrainian Power Grid
1.4. Capital One Data Breach
1.5. LinkedIn Data Hack
1.6. Zoombombing: A Technical Perspective
1.7. Case Study: Ransomware Attack on IT Firm Collabera
1.8. Neuralink: A Neural Technology Company
1.9. Securing the Internet of Things
RESEARCH CASES
1.10. Connected Vehicles: An Era of Communications Technologies
Cybersecurity
and Innovation
1.11. SilverPush: A Case of Convenience versus Privacy
SECTION 2. BEHAVIORAL AND SOCIAL CASES
TEACHING CASES
2.1. Microsoft 365 Phishing Case
2.2. Internet of Things Security: Trend Micro Experiment
2.3. 2014 Cyber-attack on eBay Case Study Analysis
2.4. Internal Revenue Service Scams
2.5. International Student Scams
2.6. Security and Privacy Risk with Social Robotics
2.7. Financial Fraud (IS System Controls) at NCL Ltd
2.8. When You Can't Believe What You See or Hear
2.9. Robots: Attack Vectors and Safeguards
2.10. Ransomware: Hollywood Presbyterian Medical Center
2.11. Fast Food Phishing: Cyber Espionage
2.12. Workplace Robots
RESEARCH CASES
2.13. Facial Recognition: Legal
Ethical
and Cultural Concerns
2.14. Aadhaar: The National Identity System of India
SECTION 3. PROCESS CASES
TEACHING CASES
3.1. NHS: COVID-19 Research Ethics and Governance
3.2. Marriot Data Breach: A Case Study Analysis
3.3. ChoicePoint
3.4. TJX
3.5. Case Study: A Data Breach on Flipboard
3.6. What Happens in Vegas: Breach of Data Confidentiality
3.7. PIH Health Phishing
3.8. Biometric Protection and Security: A Case Study on Clearview AI
3.9. Zoombombing: A Business Process Perspective
3.10. Security in the Healthcare Sector
3.11. eBay Hack
3.12. Using AI to Maintain Security of Healthcare Systems
RESEARCH CASES
3.13. Digital Identity Theft Using Deepfakes
TEACHING CASES
1.1. Data Breach at Nintendo Co. Ltd.: 300
000 Nintendo Users Hacked
1.2. Target Corporation
1.3. Case Study: Cyber-attack on Ukrainian Power Grid
1.4. Capital One Data Breach
1.5. LinkedIn Data Hack
1.6. Zoombombing: A Technical Perspective
1.7. Case Study: Ransomware Attack on IT Firm Collabera
1.8. Neuralink: A Neural Technology Company
1.9. Securing the Internet of Things
RESEARCH CASES
1.10. Connected Vehicles: An Era of Communications Technologies
Cybersecurity
and Innovation
1.11. SilverPush: A Case of Convenience versus Privacy
SECTION 2. BEHAVIORAL AND SOCIAL CASES
TEACHING CASES
2.1. Microsoft 365 Phishing Case
2.2. Internet of Things Security: Trend Micro Experiment
2.3. 2014 Cyber-attack on eBay Case Study Analysis
2.4. Internal Revenue Service Scams
2.5. International Student Scams
2.6. Security and Privacy Risk with Social Robotics
2.7. Financial Fraud (IS System Controls) at NCL Ltd
2.8. When You Can't Believe What You See or Hear
2.9. Robots: Attack Vectors and Safeguards
2.10. Ransomware: Hollywood Presbyterian Medical Center
2.11. Fast Food Phishing: Cyber Espionage
2.12. Workplace Robots
RESEARCH CASES
2.13. Facial Recognition: Legal
Ethical
and Cultural Concerns
2.14. Aadhaar: The National Identity System of India
SECTION 3. PROCESS CASES
TEACHING CASES
3.1. NHS: COVID-19 Research Ethics and Governance
3.2. Marriot Data Breach: A Case Study Analysis
3.3. ChoicePoint
3.4. TJX
3.5. Case Study: A Data Breach on Flipboard
3.6. What Happens in Vegas: Breach of Data Confidentiality
3.7. PIH Health Phishing
3.8. Biometric Protection and Security: A Case Study on Clearview AI
3.9. Zoombombing: A Business Process Perspective
3.10. Security in the Healthcare Sector
3.11. eBay Hack
3.12. Using AI to Maintain Security of Healthcare Systems
RESEARCH CASES
3.13. Digital Identity Theft Using Deepfakes