Service A responsive, open and innovative IM - IT environment supports the delivery of integrated, accessible, client-centred programs and services to Canadians Value Smart investments are high in value, cost-effective, reusable, and aligned with business outcomes Security A secure and resilient enterprise infrastructure protects information and data, and enables the trusted delivery of programs and services Agility An agile, connected and high-performing workforce with modern tools The strategic actions associated with the goals represent a range of activities, from core operating requirements to forward-looking and strategic initiatives. They are organized into categories based on themes.
Howard related a recent incident caused by the Slammer Worm that made his bank's 13, automated teller machines ATMs unavailable to their customers for approximately 24 hours.
This worm spread so quickly that his information technology IT organization could not react in time. A worm is a self-replicating malicious program that doesn't require user interaction to spread between computers and across networks.
Fast-replicating worms can consume resources, slowing computers and networks to a crawl or crashing them altogether. Sam could relate to Howard's woes because someone stole a laptop computer that contained private financial information for thousands of customers from one of his bank's offices.
Sam's business was lucky and recovered the laptop a few days later; however, his customer service organization spent considerable time contacting these customers and continues to monitor their accounts for possible fraud.
Roger was not so lucky. His bank was able to recover the majority of these funds, but the incident did considerable damage to his company's brand. These hackers then made illegal charges to the accounts of customers who fell for the scam.
The preceding anecdotes are based upon actual recent security incidents that have occurred in the financial services industry. Information security incidents are not limited to this industry, however.
All organizations that conduct portions of their business electronically are potential targets. In Aprilthe Slammer Worm disabled a safety monitoring system at a nuclear power plant for nearly five hours and affected the performance of the plant's corporate network.
The company claimed that its rival copied its source code, documentation, and other copyrighted information. Both parties settled 20 months later when the Chinese rival agreed to discontinue selling all products named in the lawsuit.
The hacker posted the information on the Internet, and the resulting brand damage was severe. Finally, two software companies in the Silicon Valley have been embroiled in a billion dollar lawsuit over the theft of intellectual property that allegedly resulted when executives from one of the companies left to form a competitive company.
A lack of knowledge about information security contributed to these incidents and left these companies vulnerable to exploitation. This book explains how you can avoid the same trap and provides you with the resources and best practices necessary to put the information to good use.
Introduction Information security is a significant boardroom issue.
In today's world, companies rely on their internal computer systems and the Internet to conduct business and cannot afford to have disruptions to their operations. A security incident can have a wide-ranging negative impact on a company's revenue streams, customer confidence, and public relations.
This dilemma makes information security an essential component to an effective overall business strategy. Establishing an information security program that addresses the risks that your business faces should be a high priority.
Overview This chapter starts with a historical view of the Internet that provides important and relevant background information for understanding information security. It goes on to describe some of the major information security challenges that you're likely to face and how they can affect your business.
These challenges are important to consider when developing your information security program, and you can turn them into competitive advantages.Big Data: A Twenty-First Century Arms Race - Free download as PDF File .pdf), Text File .txt) or read online for free.
We are living in a world awash in data. Accelerated interconnectivity, driven by the proliferation of internet-connected devices, has led to an explosion of data—big data. A race is now underway to develop new technologies and implement innovative methods that can handle.
Get the latest science news and technology news, read tech reviews and more at ABC News. 2. Cab Drivers and Operators in Singapore. Singapore is an island state with a total land area of square kilometer (km2), which is slightly smaller than the city of New York ( km2).
In November, Facebook launched Beacon, a system (discontinued in September ) where third-party websites could include a script by Facebook on their sites, and use it to send information about the actions of Facebook users on their site to Facebook, prompting serious privacy concerns.
Information such as purchases made and games played were published in the user's news feed. The “holy grail” for the information security industry is to develop similar systems to solve this problem in the security arena. An additional challenge is the relative low priority that the software industry places on security.
Although some leaders in the software industry have announced a new emphasis on security, the majority of the industry has yet to follow this example.
Boards and CEOs are more tech-savvy than they once were, but they still don't always know the best questions to ask CIOs. With the push for digital transformation they need to be armed with the right questions at the right time.