Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
INFORMATION SYSTEMS
- Winter 2017
- Shaosong Ou, Ph.D.
Learning objectives
1) Subject matter; 2) Team work; 3) Presentation skills
Requirements
All members need to participate
9-minute limit + 3-minute Q/A
Submit .ppt and report on Canvas the night before on Canvas and print hard
copies (NO email submissions!)
Team evaluation emails
Order of presentations
1. Pitches be Crazy 5. Ou-mazing!
2. Team A 6. Sales Xpress
3. Shaostrong 7. IS (Impeccably Smart)
4. Ou No
Final Exam Preparation
Confidentiality
The improper disclosure of information
Integrity
The improper modification of data
Availability
The unauthorized denial of service to data
What is a DOS Attack?
DOS Definition
Denial of Service
Attacking the availability aspect of the system
Wikileaks
Firewall & Packet Filtering
Identity Theft: Phishing
Identity Theft: Spoofing
Managing Passwords
A public key encryption system can be viewed as a series of public and private keys that lock data when they
are transmitted and unlock the data when they are received. The sender locates the recipients public key in a
directory and uses it to encrypt a message. The message is sent in encrypted form over the Internet or a private
network. When the encrypted message arrives, the recipient uses his or her private key to decrypt the data and
read the message.
Basic Text Encryption ROT 13