all guest lectures including lecture notes supplemented with slides and reference to the theory: Ometa, kpmg, aisec, bol.com, delaware, H13 guest speaker on this subject
[Management Information Systems Managing the Digital Firm,Laudon,15e] Study Guide: Your 2023-2024 Academic Lifesaver
TB142ib (I&C) - Computer & Information Systems
Summary Management Information Systems 15th Edition (chapter 1, 2, 3 and 4)
All for this textbook (10)
Written for
Universiteit Antwerpen (UA)
TEW Bedrijfskunde
Digital Organisation
All documents for this subject (3)
2
reviews
By: elisabethdeploey • 5 year ago
By: eline_dupont • 5 year ago
Seller
Follow
studentam1
Reviews received
Content preview
KPMG: cyber security
- Post-GDPR era & e-privacy
- Ransomware
If you get this on your computer, your computer is encrypted and have to pay to get
your files back
→ it has been around for a while
Ex: geranger (apple)
- Focus on mobile devices
→ USB die lijkt op een USB, maar geen USB is → hackt via het zoeken naar
wachtwoorden (probeert er heel heel heel veel)
→ wordt niet tegengehouden
- Crypto-exchanges & crypto-jackers: blockchain
There is a lot of money in this sector: these sites get hacked often
- Internet of (Insecure) Things (IoT)
Everything that you put in a powersocket will go online these days
→ why? Benefit of the vendor
→ attack vector: a watter kettle that you can turn on with your smartphone:
The waterkettle is an attack vector, if someone is outside your house he can hack you,
because the waterkettle is leaking your wifi password
→ unable to turn off my #IoT oven ever since the network went down (tweet)
→ MIRAI: biggest attack ever; gigantic amount of devices (no computers: but ovens,
tv’s, kettles,…)
- Better central regulations from supervisory authorities
- So will it happen to you?
Databases get leaked: everyone can find your password
Have I been compromised?
→ haveibeenpwned.com → is my password known?
- The threat actors
» Hacktivism: inspired by ideology
» Organised crime:
» The insider: intentional or unintentional
» The state sponsored: espionage and sabotage
, 2 ways to hack:
1. Classical hacking:
» Demo: Wifi Hack: if you want to connect my wifi you need a password
→ example: hot spot on iPhone:
Intercept: computer that says hey I want to connect → intercept it when it
gives the password
- You have to look for wifinetworks
- I want to concentrate on one specific wifi: monitoring traffic on that
network: we need a specific part of the conversation: when the
computer wants to connect → wait until someone new comes or
when someone wants to reconnect
- YOU DON’T NEED TO BE CLOSE → you can do it from anywhere
2. Hacking anno 2018:
- Humanfactor: they try to convince the user to do something stupid
- How?
Red Teaming:
Macro’s: ‘enable content’ → in macro’s you can find
interesting stuff, but also malware
USB keys: print logo on usb-stick, if you want to hide
macro’s: end op doc or m → if you don’t trost them
DON’T ENABLE CONTENT
The documents on this USB are infected.
Demo Rubber Ducky: usb plaatsen in een computer in
bedrijf
Fake wifi’s: login,ww,… sometimes with facebook
→ everything gets registered
→ page looks authentic
→ if there’s a lock: it’s secured
Cyber threat study in Belgium
80% of the companies were infected.
Why can’t we fix this?
Software is always made by humans.
, AISEC
Present in different countries and work with 9000+ partners
→ create cross-cultural understanding:
How AIESEC used to work in its early days
There was every six months a fair: trying to match (hey I have a job: do you have an
exchange?)
→ you could only be accepted twice a year
Match things could be matched throughout the whole year: but it was not efficient:
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller studentam1. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $6.51. You're not tied to anything after your purchase.