John David Hunt
Yo.
-Outside Risk
Social engineering
Malware
Viruses
Hack Attacks
-Inside Risk
Theft of Mobile Devices
Sabotage
Fraud
Negliegence
Errors
"Failure to adhere to established policies"
-Outside Risk Social engineering Malware Viruses Hack Attacks -Inside Risk Theft of Mobile Devices Sabotage Fraud Negliegence Errors "Failure to adhere to established policies"
-PMBOK says:
risk="an uncertain event or condition that, if it occurs, has a positive or negative effect on a project's objectives' "
Risk= (Probability of a loss) X (Consequence of a loss)
"Forget its hotels, Sochi’s tech has been up for the Olympic challenge ...Privacy may be lacking, but network connectivity and digital surveillance are not."
From TECHNOLOGY LAB / INFORMATION TECHNOLOGY

GOT ANY STORIES?

Russia 'protected by': A nationwide system of lawful interception of electronic communications, so-called SORM (System for Operative and Investigative Activities)
“It is important that attendees understand communications while at the Games should not be considered private,”--United States Computer Emergency Readiness Team, part of the Department of Homeland Security.




.jpg?MOD=AJPERES&CACHEID=7f2841004c54b970b19cf5c5aa157cdc)
By John David Hunt
An overview of articles about Ethics in the world focusing on Information Technology. This is also a homework assignment for ITECH564 at USC