BIS3400 – Le6 (13Mar2016)

  1. Content
    1. Lecture 8 ppt
      1. Vulnerabilities and Limits
      2. Security
        1. Big Data
        2. Internet of Things (物聯網)
        3. Who should do what and who is responsible? how to secure “data”;
        4. Responsibilities:
          1. **IT employees:
            1. Responsible: old workflow replaced by technological workflow;
            2. how to plan / estimate procedures / how to deploy apps / provide tools; 
          2. Due: due diligence
        5. New Challenges in IT to monitor data? Server / data loss in Cloud? how to monitor data / server access?
        6. Portable devices: risk of losing large amount of data / offline data;
      3. Impact of People
        1. 5W1H approach to consider?
        2. Ethical: Should we do this (right / wrong)?
        3. Social: Change of behaviors? eg.? How robots change the daily life of elders?
    2. Most difficult among E/S/L/P: ethics? social?
      1. example: technology impact to society;
        1. moving to accuracy to speed;
        2. impact to legal monitoring since technology evolves;
        3. impact to behaviors? relationship among person? closer relationship?
        4. mindset: technology – dilemma – minimize impact to others
        5. Workplace surveillance – Social impact varies with technological changes and scope changes;
        6. CCTV / Firewall – tools – neither ethical / unethical -> but Action / Activities?
        7. Expectations:
          1. Opposing views: such as freedom of speech vs boundary of laws (restricting others / causing hurt to others);
          2. Marking scheme: Vulnerability (Limitations) of IS;
            1. Can / Cannot; should / should not;
          3. 6 principals of privacy;
          4. What are the security policies? How the policies are communicated? Policies -> Procedures -> Guidelines;
          5. Why BYOD? selection of cost? selection of convienent? Security issues of BYOD?
  2. Assignment
    1. Parallel run in Assessment 2 & Assessment 3;
      1. Assessment 2 – Submission PPT (7-15 slides of content) in ~22May;
        1. Intermediate review of Assignment 3;
        2. 20% total mark of this course;
        3. Mode of VIVA with 2 to 3 questions;
        4. Marking scheme in handbook;
      2. Assessment 3 – E/S/L/P
        1. new understanding
        2. enhancement after further readings
      3. Expectation:
        1. PLAN
        2. TOC
  3. References
    1. BCS statement about …”p.6 of PPT <WK8 PPT>”www.bcs.org/upload/pdf/conduct.pdf
    2. ACM statement about …”p.6 of PPT <WK8 PPT>”
  4. Follow-ups
    1. access audit for sensitive data / permission matrix / access procedures;
    2. Conditional wipe company data of BYOD;
    3. SSD 粉碎;
Advertisements
BIS3400 – Le6 (13Mar2016)

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s