Read the attached chapters and write one page on: \”Jacob Applebaum, a noted security researcher, recently gave a speech at the 30th Chaos Computer Club Conference in Hamburg, Germany, in which he summarized some of the then known information about the NSA\’s activities. A description of this speech can be found here:http://www.contadorharrison.com/jacob-applebaums-puzzling-revelation-on-nsa-spying-toolkits/the video link is here:http://www.securitycurrent.com/en/writers/richard-stiennon/you-mad-bro-you-will-be-after-watching-these-applebaum-videos It runs an hour. Make sure to slow it down and \’rewind\’ in order to grasp the tech techniques he is describing. See this as well:http://www.zerohedge.com/news/2013-12-31/complete-guide-how-nsa-hacked-everything and along with it, the continuing debate of encryption http://arstechnica.com/security/2013/09/of-course-nsa-can-crack-crypto-anyone-can-the-question-is-how-much/ and as for the \’insider/outsider\’ problem, seehttp://www.nytimes.com/2013/06/24/technology/nsa-leak-puts-focus-on-system-administrators.html?pagewanted=1&_r=2& and further on the insider/outsider problem, here is a great example of an \’insider\’ threat to information system security:http://www.venafi.com/blog/post/edward-snowden-breaching-the-nsa-infographic/ Please see this:http://cacm.acm.org/magazines/2014/5/174340-the-nsa-and-snowden/fulltext so what did the NSA not get in all this, anyway? The acronym NSA stands for \”NationalSECURITY Agency.\” Please respond with NON-POLITICAL, NON-GEOPOLITICAL, NON-ETHICS-RELATED comments about the implications of all these things for IT-security protection and aspects of auditing\” SECOND PAGE ON: \”Please view the video below (FREE registration required) and (a) post links to at least one other firm impacted by IT failures with regulatory or legal consequences, and (b) discuss the video itself. FIRST REGISTER AT:http://www.securitiesdocket.com/webcasts/?commid=109967THEN VIEW THE FOLLOWING VIDEO: CYBERSECURITY AND FINANCIAL FIRMS–BRACING FOR THE REGULATORY ONSLAUGHT. In preparing to respond, you might also wish to look up: (a) the very recent problems at JP Morgan Chase (specifically the London Whale episode, and the internal control failures); (b) Kidder Peabody in the 1990s episode, with a Mr. Jett as the purported culprit; (c) Nick Leeson and the Barings Bank fail (not hi-tech, but important); (d) Kievel and Societe Generale.\” THE THIRD PAGE ON: \” Read the information in these links and, pull together the information in these links with the general topics of ITsecurity, business continuity, disaster recovery, problems born of data potentially being stored overseas–in countries where, of course, the laws may differ. How does cloud storage interact with ecommerce, or does it? Can you provide additional links on securityproblems with ecommerce? How would ecommerce issues/problems differ from those of brick-and-mortar stores? What about the fundamentalsecurity flaws that have been found in the underlying software that runs the Internet (i.e., the Heartbleed bug. https://hbr.org/2014/04/heartbleed-the-branding-of-a-bug-and-the-internet-of-things). The link is: http://delong.typepad.com/sdj/2014/05/weekend-reading-susan-berger-how-finance-gutted-manufacturing.html The key area of that article begins with the words: \”This process has been fostered by great technological advances in digitization….\” and ends with the wording: \”Over time, it becomes more likely that innovation will shift to places where companies have more experience with scale-up and commercialization.\” THEN read the following and reflect on the following in the context of the important section of the immediately above-referenced link. Some links to get you STARTED, but to which you should add–WITH EXPLANATIONS OF WHY YOU THINK THEY ARE USEFUL–include:http://www.technologyreview.com/news/518506/dropbox-and-similar-services-can-sync-malware/www.nytimes.com/2010/04/19/technology/19cloud.htmlhttp://www.technologyreview.com/featuredstory/416804/security-in-the-ether/http://www.infolawgroup.com/2009/08/articles/cloud-computing-1/legal-implications-of-cloud-computing-part-one-the-basics-and-framing-the-issues/http://www.infolawgroup.com/2009/09/articles/breach-notice/legal-implications-of-cloud-computing-part-two-privacy-and-the-cloud/http://www.infolawgroup.com/2009/10/articles/cloud-computing-1/legal-implications-of-cloud-computing-part-three-relationships-in-the-cloud/http://www.infolawgroup.com/2009/11/articles/cloud-computing-1/legal-implications-of-cloud-computing-part-four-ediscovery-and-digital-evidence/ \”

Leave a Reply

Your email address will not be published. Required fields are marked *

ten + one =

This site uses Akismet to reduce spam. Learn how your comment data is processed.