Attribution: SANS Security Awareness Identity theft happens when a criminal steals information about you and uses that information to commit fraud, such as requesting unemployment benefits, tax refunds, or a new loan or credit card in your name. If you don’t take precautions, you may end up paying for products or services that you didn’t buy and dealing with the stress and financial heartache that follows identity theft. Your personal information exists in numerous places all over the internet. Every time you browse or purchase something online, watch a video, buy groceries, visit your doctor, or use an app on your smartphone, information about you is being collected. That information is often legally sold or shared with other companies. Even if just one of these gets hacked, the criminals can gain access to your personal information. Assume that some information about you is already available to criminals and consider what you can do to slow down or detect the use of your information for fraud
63 Results
Students apply the design process to the problem of hiding a message in a digital image using steganographic methods, a PictureEdit Java class, and API (provided as an attachment). They identify the problems and limitations associated with this task, brainstorm solutions, select a solution, and implement it. Once their messages are hidden, classmates attempt to decipher them. Based on the outcome of the testing phase, students refine and improve their solutions.
- Subject:
- Applied Science
- Computer Science
- Engineering
- Material Type:
- Activity/Lab
- Provider:
- TeachEngineering
- Provider Set:
- TeachEngineering
- Author:
- Brian Sandall
- Derek Babb
- Date Added:
- 09/18/2014
This class offers a broad coverage of technology concepts and trends underlying current and future developments in information technology, and fundamental principles for the effective use of computer-based information systems. There will be a special emphasis on networks and distributed computing, including the World Wide Web. Other topics include: hardware and operating systems, software development tools and processes, relational databases, security and cryptography, enterprise applications, and electronic commerce. Hands-on exposure to Web, database, and graphical user interface (GUI) tools.
This course is intended for students with little or no background in computer technology. Students with extensive education or work experience in computer technology should consider taking a more advanced course.
- Subject:
- Applied Science
- Computer Science
- Engineering
- Material Type:
- Full Course
- Provider Set:
- MIT OpenCourseWare
- Author:
- Malone, Thomas
- Date Added:
- 02/01/2005
In virtually every industry and every firm, information technology is driving change, creating opportunities and challenges. Leaders who don’t understand at least the fundamentals of information systems will be at a strategic disadvantage. This course provides broad coverage of technology concepts and trends underlying current and future developments in information technology, and fundamental principles for the effective use of computer-based information systems. There will be a special emphasis on manufacturing. Information Systems topics that will be covered include networks and distributed computing, including the World Wide Web, hardware and operating systems, software development tools and processes, relational databases, security and cryptography, enterprise applications, B2B, the semantic web and electronic commerce. Sloan LFM students with an interest in Information Systems are encouraged to register for this course.
- Subject:
- Applied Science
- Career and Technical Education
- Computer Science
- Manufacturing
- Material Type:
- Full Course
- Provider Set:
- MIT OpenCourseWare
- Author:
- Subirana, Brian
- Date Added:
- 02/01/2003
This Problem-Based Learning Assignment addresses the following questions:
- When do Americans have the right to privacy?
- Are there ever any circumstances where Americans should give up certain rights to privacy in order to have greater security measures to be protected by the government?
Grabber: a John Oliver video and two articles about snapchat and internet privacy, relevant to students' worlds
Introductory mini lesson is included
In the Culminating Activity students are researching the FBI v. Apple debate. They are split into four group sand must collaborate together to come up with a stance their perspective would agree with alongside historical events in history that support their side.
- Subject:
- Social Science
- Material Type:
- Lesson Plan
- Date Added:
- 10/10/2016
This course examines cyber dynamics and processes in international relations from different theoretical perspectives. It considers alternative theoretical and empirical frameworks consistent with characteristic features of cyberspace and emergent transformations at all levels of international interaction. Theories examined include realism and neorealism, institutionalism and liberalism, constructivism, and systems theory and lateral pressure. The course also highlights relevant features and proposes customized international relations theory for the cyber age.
Students taking the graduate version are expected to pursue the subject in greater depth through reading and individual research.
- Subject:
- Political Science
- Social Science
- Material Type:
- Full Course
- Provider Set:
- MIT OpenCourseWare
- Author:
- Choucri, Nazli
- Date Added:
- 09/01/2015
This introductory survey course is intended to develop an understanding of key issues and dilemmas of planning in non-Western countries. The issues covered by the course include state intervention, governance, law and institutions in development, privatization, participatory planning, decentralization, poverty, urban-rural linkages, corruption and civil service reform, trade and outsourcing and labor standards, post-conflict development and the role of aid in development.
- Subject:
- Economics
- Social Science
- Material Type:
- Full Course
- Provider Set:
- MIT OpenCourseWare
- Author:
- Rajagopal, Balakrishnan
- Date Added:
- 09/01/2011
This course explores perspectives in the policy process - agenda setting, problem definition, framing the terms of debate, formulation and analysis of options, implementation and evaluation of policy outcomes using frameworks including economics and markets, law, and business and management. Methods include cost/benefit analysis, probabilistic risk assessment, and system dynamics. Exercises include developing skills to work on the interface between technology and societal issues; simulation exercises; case studies; and group projects that illustrate issues involving multiple stakeholders with different value structures, high levels of uncertainty, multiple levels of complexity; and value trade-offs that are characteristic of engineering systems. Emphasis on negotiation, team building and group dynamics, and management of multiple actors and leadership.
- Subject:
- Applied Science
- Business and Communication
- Computer Science
- Management
- Material Type:
- Full Course
- Provider Set:
- MIT OpenCourseWare
- Author:
- Ross, Dan
- Weigel, Annalisa
- Date Added:
- 09/01/2006
This course explores Japan’s role in world orders, past, present, and future. It focuses on Japanese conceptions of security; rearmament debates; the relationship of domestic politics to foreign policy; the impact of Japanese technological and economic transformation at home and abroad; alternative trade and security regimes; Japan’s response to 9/11; and relations with Asian neighbors, Russia, and the alliance with the United States.
- Subject:
- Economics
- Political Science
- Social Science
- Sociology
- Material Type:
- Full Course
- Provider Set:
- MIT OpenCourseWare
- Author:
- Samuels, Richard
- Date Added:
- 09/01/2016
The K12 Security Information eXchange (K12 SIX) released “Cybersecurity Frameworks: What K-12 Leaders Need to Know,” a new resource for state and local education leaders encouraging the adoption of nationally recognized cybersecurity best practices. This white paper was commissioned by the State Educational Technology Directors Association (SETDA) as part of the work of its Cybersecurity & Privacy Collaborative.
- Subject:
- Education
- Educational Technology
- Material Type:
- Case Study
- Author:
- K12 SIX
- Date Added:
- 10/18/2022
In this podcast, Professor Richard Aldrich from the School of Politics and International Relations, discusses the impact of globalisation, the opportunities this affords to global terrorists and the challenges faced by the intelligence services.
Globalisation has led to a free flow of money, people and ideas, which has benefited many people in the West in recent years and enhanced our standard of living, but the price paid is a reduction in security. As we see a shift towards a de-regulated global economy, with states removing controls over their borders, how does a state maintain its security? This has led to an increase in intelligence led activities and increasing expectations upon them.
In addition, Professor Aldrich discusses how mass communication has magnified the influence of terrorists and increased the problems faced by the security services. Finally, Professor Aldrich also discusses the challenges faced by the state in balancing our security, liberty and luxury. Are our civil liberties at risk?
- Subject:
- Social Science
- Material Type:
- Lecture
- Provider:
- University of Nottingham
- Author:
- Professor Richard Aldrich
- Date Added:
- 03/21/2017
In this podcast, Professor Richard Aldrich from the School of Politics and International Relations, discusses the impact of globalisation, the opportunities this affords to global terrorists and the challenges faced by the intelligence services.
Globalisation has led to a free flow of money, people and ideas, which has benefited many people in the West in recent years and enhanced our standard of living, but the price paid is a reduction in security. As we see a shift towards a de-regulated global economy, with states removing controls over their borders, how does a state maintain its security? This has led to an increase in intelligence led activities and increasing expectations upon them.
In addition, Professor Aldrich discusses how mass communication has magnified the influence of terrorists and increased the problems faced by the security services. Finally, Professor Aldrich also discusses the challenges faced by the state in balancing our security, liberty and luxury. Are our civil liberties at risk?
- Subject:
- Social Science
- Material Type:
- Lecture
- Provider:
- University of Nottingham
- Author:
- Professor Richard Aldrich
- Date Added:
- 03/22/2017
The focus of the course is on medical science and practice in the age of automation and the genome, both present and future.
It ncludes an analysis of the computational needs of clinical medicine, a review systems and approaches that have been used to support those needs, and an examination of new technologies.
- Subject:
- Applied Science
- Biology
- Computer Science
- Engineering
- Life Science
- Material Type:
- Full Course
- Provider Set:
- MIT OpenCourseWare
- Author:
- Kohane, Isaac
- Ohno-Machado, Lucila
- Szolovits, Peter
- Date Added:
- 02/01/2003
Edward Snowden's revelations about government surveillance of private citizens sparked debate around the world about the trade off between privacy and security. The Institute for Humane Studies invited Professor Ronald Sievert of Texas A&M and Cindy Cohn, legal director for the Electronic Frontier Foundation to answer questions about government data collection. This is their debate.
- Subject:
- Political Science
- Social Science
- Material Type:
- Lecture
- Provider:
- Institute for Humane Studies
- Author:
- Ronald Sievert
- Date Added:
- 09/12/2017
6.857 Network and Computer Security is an upper-level undergraduate, first-year graduate course on network and computer security. It fits within the Computer Systems and Architecture Engineering concentration.
- Subject:
- Applied Science
- Computer Science
- Engineering
- Material Type:
- Full Course
- Provider Set:
- MIT OpenCourseWare
- Author:
- Rivest, Ronald
- Date Added:
- 02/01/2014
Countering the Threat From States and Non-State Actors
Short Description:
The danger posed by nuclear weapons and fissile materials is ever present. The end of the Cold War and the significant reduction in the size of Russian and U.S. nuclear stockpiles did not change this fact of life. There are now nine states that possess nuclear weapons – the United States, Russia, the United Kingdom, France, China, Israel, India, Pakistan, and North Korea – and the number of nuclear weapons in the world in 2019 is estimated to be almost 14,000. In addition, the production of highly-enriched uranium and plutonium continues in several places, while more than 440 civilian nuclear facilities around the world are in operation, posing their own particular risks. When one also considers that non-state actors constitute a significant global danger and the potential for nuclear terrorism, it is clear the need for nuclear security remains paramount. There is no other type of weapon that comes close to doing the level of damage that nuclear weapons can inflict. Data dashboard
Word Count: 3351
(Note: This resource's metadata has been created automatically by reformatting and/or combining the information that the author initially provided as part of a bulk import process.)
- Subject:
- Career and Technical Education
- Criminal Justice
- Material Type:
- Textbook
- Provider:
- Oregon State University
- Author:
- Ben Wickizer
- David Bernell
- Meredith Bowers
- Date Added:
- 11/18/2019
This course will expose students to tools and methods of analysis for use in assessing the challenges and dangers associated with nuclear weapons in international politics. The first two weeks of the course will look at the technology and design of nuclear weapons and their means of production. The next five weeks will look at the role they played in the Cold War, the organizations that managed them, the technologies that were developed to deliver them, and the methods used to analyze nuclear force structures and model nuclear exchanges. The last six weeks of the course will look at theories and cases of nuclear decision making beyond the original five weapon states, and will look particularly at why states pursue or forego nuclear weapons, the role that individuals and institutions play, and the potential for both new sources of proliferation and new consequences.
- Subject:
- Arts and Humanities
- History
- Political Science
- Social Science
- Material Type:
- Full Course
- Provider Set:
- MIT OpenCourseWare
- Author:
- Cote, Owen
- Walsh, James
- Date Added:
- 02/01/2009
The course presents an overview of the history and structure of modern operating systems, analyzing in detail each of the major components of an operating system, and exploring more advanced topics in the field, such as security concerns. Upon successful completion of this course, the student will be able to: explain what an operating system does and how it is used; identify the various components of a computer system and how they interact with an operating system; describe the differences between a 32-bit and 64-bit operating system; explain the different types of operating systems and the major ones in use today; discuss the importance and use of threads and processes in an operating system; describe concurrency; explain the difference between a thread and a process; discuss context switching and how it is used in an operating system; describe synchronization; explain a race condition; discuss interprocess communication; describe how semaphores can be used in an operating system; discuss three of the classic synchronization problems; explain the alternatives to semaphores; discuss CPU scheduling and its relevance to operating systems; explain the general goals of CPU scheduling; describe the differences between pre-emptive and non-preemptive scheduling; discuss four CPU scheduling algorithms; explain what deadlock is in relation to operating systems; discuss deadlock prevention, avoidance, and their differences; describe deadlock detection and recovery; explain the memory hierarchy; discuss how the operating system interacts with memory; describe how virtual memory works; discuss three algorithms for dynamic memory allocation; explain methods of memory access; describe paging and page replacement algorithms; describe a file system and its purpose; discuss various file allocation methods; explain disk allocation and associated algorithms; discuss types of security threats; describe the various types of malware; explain basic security techniques; explain basic networking principles; discuss protocols and how they are used; explain reference models, particularly TCP/IP and OSI. (Computer Science 401)
- Subject:
- Applied Science
- Computer Science
- Material Type:
- Full Course
- Provider:
- The Saylor Foundation
- Date Added:
- 11/16/2011
The Politics of Security tells the story of how people experienced the cold war as a war. It is about the impact of the cold war on political cultures. This crucial issue is often forgotten in historical memory. In particular, the book follows British and West German anti-nuclear-weapons activists in their attempts to campaign for and create security after the destruction of the Second World War, and how their own version of security clashed with concepts advanced by their own governments. But the book also demonstrates how, as part of the protests against nuclear weapons, activists and their societies learned to live with the Bomb: it recounts how activists first discovered the dangers of nuclear weapons, but how a different generation of activists came to focus on other issues as the Vietnam War became their primary concern. And it makes comprehensible how activists in two societies who had fought each other fiercely in the battle of dictatorships and democracies of the Second World War could now come to see each other as part of a common campaign. Fundamentally, with its transnational approach, the book highlights how these two societies drew on very similar arguments when they came to understand the cold war through the prism of the previous world war. The book is the first to capture in a transnational fashion what activists did on the marches and what it meant to them and to others. The book thus reminds us that threats are not merely out there, but that they need to be created in a political process that involves struggles for power and contestation.
- Subject:
- Political Science
- Social Science
- Material Type:
- Reading
- Provider:
- Oxford University Press
- Author:
- Holger Nehring
- Date Added:
- 01/01/2013
This unit defines privacy, confidentiality, and security of health information, including the HIPPA Privacy and Security Rules.
- Subject:
- Applied Science
- Health, Medicine and Nursing
- Material Type:
- Lecture
- Provider:
- Open Michigan
- Provider Set:
- Health IT Workforce Curriculum
- Author:
- Oregon Health & Science University
- Date Added:
- 09/26/2014