RISKS and THREATS for I.T.
- attacks
- as explained by Bruce Schneier
last updated 2016 Sept 14
 
. This page used in the following courses taught by Prof. Richardson
.
FCA 240
BIT 801
MGM 723
MGD 415
MGD 426
...
DRO
 
Digital
Risk
Officer
"Gartner Says 2015 Will See the Emergence of Digital Risk and the Digital Risk Officer"
http://www.gartner.com/newsroom/id/2794417
"The mandate and scope of a DRO is very different than a chief information security officer (CISO) and in many organizations the CISO role will continue with similar scope as in 2014. The DRO will report to a senior executive role outside of IT such as the chief risk officer, chief digital officer or the chief operating officer. They will manage risk at an executive level across digital business units working directly with peers in legal, privacy, compliance, digital marketing, digital sales and digital operation"

"Development of a digital risk management capability requires deconstruction and re-engineering of current organizational structures and allocations of responsibility as well as the development of new capabilities in security and risk assessment, monitoring, analysis and control."

.
Differences in prevention, detection and response between crime and cybercrime? 

A video segment from a speech given by Tim Richardson in October 2013 at The Mackenzie Institute
 youtube.com/watch?v=FL3JazaPvOE

..

Chpt 3

Types of
Attacks
 

Secrets & Lies: Digital Security in a Networked  World
by Bruce Schneier
Chpt 3 Attacks
 
KEY
POINTS
Schneier's third chapter in the book is an excellent overview of the different classes of attacks.  The main themes, summarized in point form, are arranged below.

The reason for knowing many of the terms on this list is so that you may understand the variety and range of the types of risks that can effect your organization. While new technologies may come and go, and new vulnerabilities created (like Social Media since 2011) the fundamentals of what is at stake are, relatively, unchanging...agree? ..disagree?

WTGR

..

Chpt 3

Types of
Attacks

  • Criminal Attacks
    • fraud
    • scams
      • exploding with the advent of Social Media
    • destructive attacks
    • intellectual property attacks 
      • piracy
      • unauthorized copy of text and images from one site to another
    • identity theft

    • see  witiger.com/ecommerce/identitytheft.htm
    • brand theft
    • prosecution
  • Privacy Violations
    • data harvesting
      • exploiting new technologie with Social Media
    • surveillance
    • databases
    • traffic analysis
    • massive electronic surveillance
  • Publicity Attacks
  • Legal Attacks
    • what "Patent Trolls" NTB did to R.I.M.
.
 

Chpt 3

Types of
Attacks

- Scams

Scams
Schneier quotes the National Consumers League (Chpt 3, page 24)
"the five most common online scams are
- see www.witiger.com/ecommerce/scams.htm
  • sale of internet services
  • sale of general merchandise
  • auctions
  • pyramid and multi-level marketing schemes
  • business opportunities"
  • .
    permission to quote Bruce Schneier and to quote from his book dealt with in emails June 9th, 2006. Copies of emails kept in the permissions binder.
     
     
    witiger.com
      CONTACT I MAIN PAGE I NEWS GALLERY I E-BIZ SHORTCUTS I INT'L BIZ SHORTCUTS I MKTG&BUSINESS SHORTCUTS I TEACHING SCHEDULE
    .
      MISTAKES ITEXTS USED I IMAGES I RANK IDISCLAIMER I STUDENT CONTRIBUTORS I FORMER STUDENTS I
    .
    .