CNIT 160: Ch 2a: Introduction to Information Security Governance

Sam Bowne
Sam BowneInstructor at CCSF
CNIT 160:
Cybersecurity
Responsibilities
2. Information Security 

Governance

Part 1

Pages 16 - 55
Topics in Part 1
• Introduction to Information Security
Governance
• Reason for Security Governance
• Security Governance Activities and
Results
• Business Alignment
• Roles and Responsibilities
Topics in Part 1 

(continued)
• Introduction to Information Security
Governance (continued)
• Monitoring Responsibilities
• Information Security Governance Metrics
• The Security Balanced Scorecard
• Business Model for Information Security
Topics in Part 2
• Security Strategy Development
• Strategy Objectives
• Control Frameworks
• Risk Objectives
• Strategy Resources
• Strategy Development
• Strategy Constraints
Governance
• A process whereby senior management
exerts strategic control over business
functions
• Through policies, objectives, delegation of
authority, and monitoring
• Ensures that business processes
effectively meet vision and objectives
Information Security
Governance
• Focuses on key processes
• Personnel management
• Sourcing
• Risk management
• Configuration management
• Change management
• Access management
Information Security
Governance
• Focuses on key processes (continued)
• Vulnerability management
• Incident management
• Business continuity planning
• Establishment of an effective organization
structure and clear statements of roles and
responsibilities
Information Security
Governance
• Monitor processes with scorecard or
metrics
• Continuous improvement changes
processes to keep them effective and
support ongoing business needs
CNIT 160: Ch 2a: Introduction to Information Security Governance
CNIT 160: Ch 2a: Introduction to Information Security Governance
CNIT 160: Ch 2a: Introduction to Information Security Governance
CNIT 160: Ch 2a: Introduction to Information Security Governance
Reason for Security
Governance
• Organizations are dependent on
information systems
• Must understand priority of
• Confidentiality
• Integrity
• Availability
Security Governance
Activities and Results
• Risk management
• Risk assessments and follow-up actions
to reduce risks
• Process improvement
• Event identification
• Security events and incidents
• Incident response
Security Governance
Activities and Results
• Improved compliance
• With laws, regulations, and standards
• Business continuity and disaster recovery
planning
• Metrics management
• Measure key security events, such as
incidents, policy changes, violations,
audits, and training
Security Governance
Activities and Results
• Resource management
• Allocation of manpower, budget, and
resources
• Improved IT governance
• Increased trust
• From customers, suppliers and partners
• Improved reputation
Business Alignment
• Security program must align with guiding
principles
• Mission
• Why the organization exists
• Goals and objectives
• What achievements it wants to accomplish
• Strategy
• Activities needed to fulfill goals and objectives
Organization's
Characteristics
• Culture
• Asset value
• Risk tolerance
• Legal obligations
• Market conditions
Dr. No
• Security that prevents necessary business
practices
• Leads to "Shadow IT"
• Departments setting up uncontrolled IT
assets
Organization's
Characteristics
• Goals and objectives
• Risk appetite
• Risk-averse organizations have a formal
system of accountability for risk
decisions
Facebook
• https://www.wired.com/2016/11/buy-facebook-propaganda-posters/
Roles and Responsibilities
• Role describes expected activities
Ranks
• In order of increasing seniority
Responsibilities
• Specific
• General
RACI Charts
RACI Charts
Considerations
• When assigning roles in a RACI chart
• Skills
• Segregation of duties
• Conflict of interest
Ch 2a-1
Board of Directors
• Fiduciary duty
• Accountable to shareholders to act in the
best interests of the organization
• Selected for
• Investor representation
• Business experience
• Access to resources
• Appoints the CEO
Five Principles
• From National Association of Corporate
Directors
Executive Management
• Carries out directives from the board of
directors
• Ratifies corporate security policy
• Publicly supporting it
• Leads by example
• Has ultimate responsibility
Executive Management
Security Steering
Committee's Responsibilities
• Risk treatment deliberation and
recommendation
• Discussion and coordination of IT and
security projects
• Review of recent risk assessments
• Discussion of new laws, regulations, and
requirements
• Review of recent security incidents
Business Process and
Business Asset Owners
• Usually nontechnical personnel
• Responsibilities:
• Access grants, revocation, and reviews
• Configuration
• Function definition
• Process definition
• Physical location
Custodial Responsibilities
• IT staff acts as a proxy for asset owners
• Should implement decisions from the asset
owner
• But often the asset owner is uninvolved
and uninformed, instead of periodically
reviewing these decisions
• https://www.nbcnews.com/business/consumer/former-equifax-ceo-blames-one-it-guy-massive-
hack-n807956
Chief Information Security
Officer (CISO)
• Highest-ranking security person
• Develops security strategies
• Similar titles
• Chief Security Officer (CSO)
• Chief Information Risk Officer (CIRO)
• Chief Risk Officer (CRO)
Position of CISO
• Reports to Chief Operating Officer (COO) or
Chief Executive Officer (CEO)
• Sometimes to CIO or legal or someone
else
• Many organizations lack a CISO but have a
manager of information security lower on
the org chart, weakening security posture
• Small to medium-sized orgs may contract
with a virtual CISO for strategy and planning
Rank Sets Tone and Gives
Power
Chief Privacy Officer
• For organization with large amounts of
customer Personally Identifiable
Information (PII)
• Regulations like
• Health Insurance Portability and
Accountability Act (HIPAA)
• Fair Credit Reporting Act (FRCA)
• The Gramm-Leach-Bliley Act (GLBA)
Software Development
• Systems architect
• Systems analyst
• Software engineer/developer
• Software tester
Data Management
• Data manager
• Database architect
• Big data architect
• Database administrator (DBA)
• Database analyst
• Data scientist
Network Management
• Network architect
• Network engineer
• Network administrator
• Telecom engineer
Systems Management
• Systems architect
• Systems analyst
• Storage engineer
• Systems administrator
Operations
• Operations manager
• Operations analyst
• Controls analyst
• Systems operator
• Data entry
• Media manager
Security Operations
• Security architect
• Security engineer
• Security analyst
• Examines logs
• Access administrator
Security Audit
• Security audit manager
• Security auditor
Service Desk
• Service desk manager
• Service desk analyst
• Technical support analyst
Quality Assurance & Other
Roles
• QA manager
• QC manager
• Vendor manager
• Project manager
General Staff Security
Responsibilities
Monitoring Responsibilities
• Confirming that the correct jobs are being
carried out in the correct way
• Controls and internal audit
• Metrics and reporting
• Work measurement
• Performance evaluation
• 360 feedback -- from peers, subordinates,
and management
• Position benchmarking -- comparing job
titles with other organizations
Information Security
Governance Metrics
• Technical metrics, counts of events from
• Firewall, IDS, Anti-malware, DLP, etc.
• Business-related metrics
• Key Risk Indicators (KRIs)
• Key Goal Indicators (KGIs)
• Key Performance Indicators (KPIs)
Return on Security
Investment
• Difficult to quantify
• Because breaches are rare
• Other ways to justify security
• Fiduciary responsibility
• Regulation
• Competitive differentiation
SMART Metrics
Good Considerations for
Metrics
Ch 2a-1
Risk Management
Performance Measurement
Convergence Metrics
• Large organizations with multiple business
units or locations
Value Delivery Metrics
Resource Management
Metrics
Security Balanced
Scorecard
Business Model for
Information Security
Business Model for
Information Security
BMIS Elements and
Dynamic Interconnections
• Elements
• Organization
• People
• Process
• Technology
BMIS Elements and
Dynamic Interconnections
• Dynamic Interconnections
• Culture
• Governing
• Architecture
• Emergence
• Enabling and Support
• Human Factors
Culture
• "a pattern of behaviors, beliefs,
assumptions, attitudes, and ways of doing
things"
• Critical to the success or failure of an
information security program
• Cannot be legislated or controlled directly
Steps to Create Favorable
Security Culture
Governing
Architecture
Architecture
The Zachman Framework
• The dominant architecture architecture
standard
Data Flow Diagram
Emergence
• People learning to do things better
• Can lead to improvements, but also cause
inconsistent results
Enabling and Support
• Technology and business people don't
understand one another
• To fill this gap, create a requirements
document
• Charts listing required and desired
functionality for new technologies
BMIS Enabling and Support
Life Cycle
Human Factors
• Also called Human-Computer Interaction
(HCI)
• Includes User Interface (UI)
• Consistency with other systems
• Typing and data entry methods
• Display and readability
• Error recovery
• Sound
• Voice and biometric recognition
• Ergonomics
• Environment
Human Factors
Example 1:
Adverse Effects of a Policy Change
• New policy
regarding
personal
devices and
company email
• Affects
organization
and processes
• Changed
processes
affect people
and technology
• An outside security audit shows that
servers are months behind in security
patches
• The company uses a vulnerability scanner
to keep up-to date, for compliance
• Why is it failing?
Example 2:
Causes for Process Weakness
• Possible causes:
• Technology --
scanner is
faulty
Example 2:
Causes for Process Weakness
• Possible causes:
• Architecture--
scanner can't
reach all
systems in
network
• Human
factors--
engineers not
using scanner
properly
Example 2:
Causes for Process Weakness
• Possible causes:
• Enabling &
Support--
Interview
engineers about
business
processes
• New networks
have been added
that are not
included in
scanner's
configuration
Example 2:
Causes for Process Weakness
Ch 2a-1
CNIT 160: Ch 2a: Introduction to Information Security Governance
1 of 85

Recommended

CNIT 160: Ch 3a: Risk Management Concepts & Implementing a Program by
CNIT 160: Ch 3a: Risk Management Concepts & Implementing a ProgramCNIT 160: Ch 3a: Risk Management Concepts & Implementing a Program
CNIT 160: Ch 3a: Risk Management Concepts & Implementing a ProgramSam Bowne
240 views42 slides
CNIT 160: Ch 3d: Operational Risk Management by
CNIT 160: Ch 3d: Operational Risk ManagementCNIT 160: Ch 3d: Operational Risk Management
CNIT 160: Ch 3d: Operational Risk ManagementSam Bowne
335 views77 slides
CNIT 160 4b: Security Program Management (Part 2) by
CNIT 160 4b: Security Program Management (Part 2)CNIT 160 4b: Security Program Management (Part 2)
CNIT 160 4b: Security Program Management (Part 2)Sam Bowne
179 views60 slides
CNIT 160 Ch 4b: Security Program Management by
CNIT 160 Ch 4b: Security Program ManagementCNIT 160 Ch 4b: Security Program Management
CNIT 160 Ch 4b: Security Program ManagementSam Bowne
469 views58 slides
Ch 3a: Risk Management Concepts by
Ch 3a: Risk Management ConceptsCh 3a: Risk Management Concepts
Ch 3a: Risk Management ConceptsSam Bowne
162 views43 slides
CNIT 160 Ch 4a: Information Security Programs by
CNIT 160 Ch 4a: Information Security ProgramsCNIT 160 Ch 4a: Information Security Programs
CNIT 160 Ch 4a: Information Security ProgramsSam Bowne
327 views55 slides

More Related Content

What's hot

CNIT 160: Ch 3c: The Risk Management Life Cycle by
CNIT 160: Ch 3c: The Risk Management Life CycleCNIT 160: Ch 3c: The Risk Management Life Cycle
CNIT 160: Ch 3c: The Risk Management Life CycleSam Bowne
88 views61 slides
CNIT 160 Ch 4b: Security Program Management by
CNIT 160 Ch 4b: Security Program ManagementCNIT 160 Ch 4b: Security Program Management
CNIT 160 Ch 4b: Security Program ManagementSam Bowne
178 views58 slides
CNIT 160 3a Information Risk Management by
CNIT 160 3a Information Risk ManagementCNIT 160 3a Information Risk Management
CNIT 160 3a Information Risk ManagementSam Bowne
133 views43 slides
CNIT 160 Ch 4c: Security Program Development (Part 3) by
CNIT 160 Ch 4c: Security Program Development (Part 3)CNIT 160 Ch 4c: Security Program Development (Part 3)
CNIT 160 Ch 4c: Security Program Development (Part 3)Sam Bowne
138 views53 slides
CNIT 160: Ch 2b: Security Strategy Development by
CNIT 160: Ch 2b: Security Strategy DevelopmentCNIT 160: Ch 2b: Security Strategy Development
CNIT 160: Ch 2b: Security Strategy DevelopmentSam Bowne
350 views90 slides
CNIT 160: 3. Information Risk Management (Part 4) by
CNIT 160: 3. Information Risk Management (Part 4)CNIT 160: 3. Information Risk Management (Part 4)
CNIT 160: 3. Information Risk Management (Part 4)Sam Bowne
249 views77 slides

What's hot(20)

CNIT 160: Ch 3c: The Risk Management Life Cycle by Sam Bowne
CNIT 160: Ch 3c: The Risk Management Life CycleCNIT 160: Ch 3c: The Risk Management Life Cycle
CNIT 160: Ch 3c: The Risk Management Life Cycle
Sam Bowne88 views
CNIT 160 Ch 4b: Security Program Management by Sam Bowne
CNIT 160 Ch 4b: Security Program ManagementCNIT 160 Ch 4b: Security Program Management
CNIT 160 Ch 4b: Security Program Management
Sam Bowne178 views
CNIT 160 3a Information Risk Management by Sam Bowne
CNIT 160 3a Information Risk ManagementCNIT 160 3a Information Risk Management
CNIT 160 3a Information Risk Management
Sam Bowne133 views
CNIT 160 Ch 4c: Security Program Development (Part 3) by Sam Bowne
CNIT 160 Ch 4c: Security Program Development (Part 3)CNIT 160 Ch 4c: Security Program Development (Part 3)
CNIT 160 Ch 4c: Security Program Development (Part 3)
Sam Bowne138 views
CNIT 160: Ch 2b: Security Strategy Development by Sam Bowne
CNIT 160: Ch 2b: Security Strategy DevelopmentCNIT 160: Ch 2b: Security Strategy Development
CNIT 160: Ch 2b: Security Strategy Development
Sam Bowne350 views
CNIT 160: 3. Information Risk Management (Part 4) by Sam Bowne
CNIT 160: 3. Information Risk Management (Part 4)CNIT 160: 3. Information Risk Management (Part 4)
CNIT 160: 3. Information Risk Management (Part 4)
Sam Bowne249 views
CNIT 160 Ch 4 Information Security Program Development (Part 3) by Sam Bowne
CNIT 160 Ch 4 Information Security Program Development (Part 3)CNIT 160 Ch 4 Information Security Program Development (Part 3)
CNIT 160 Ch 4 Information Security Program Development (Part 3)
Sam Bowne146 views
1. Security and Risk Management by Sam Bowne
1. Security and Risk Management1. Security and Risk Management
1. Security and Risk Management
Sam Bowne1.4K views
CNIT 160: Ch 3b: The Risk Management Life Cycle by Sam Bowne
CNIT 160: Ch 3b: The Risk Management Life CycleCNIT 160: Ch 3b: The Risk Management Life Cycle
CNIT 160: Ch 3b: The Risk Management Life Cycle
Sam Bowne381 views
2. Asset Security by Sam Bowne
2. Asset Security2. Asset Security
2. Asset Security
Sam Bowne480 views
CISSP Preparation: Introduction by Sam Bowne
CISSP Preparation: IntroductionCISSP Preparation: Introduction
CISSP Preparation: Introduction
Sam Bowne773 views
Professional Designations IT Assurance by a3virani
Professional Designations IT AssuranceProfessional Designations IT Assurance
Professional Designations IT Assurance
a3virani429 views
6. Security Assessment and Testing by Sam Bowne
6. Security Assessment and Testing6. Security Assessment and Testing
6. Security Assessment and Testing
Sam Bowne511 views
Integrated APT-IGA Solution - Future of IT Security (Vladislav Shapiro, Immer... by BAKOTECH
Integrated APT-IGA Solution - Future of IT Security (Vladislav Shapiro, Immer...Integrated APT-IGA Solution - Future of IT Security (Vladislav Shapiro, Immer...
Integrated APT-IGA Solution - Future of IT Security (Vladislav Shapiro, Immer...
BAKOTECH592 views
project managmnet by darshan942
project managmnetproject managmnet
project managmnet
darshan942113 views
CNIT 125: Ch 2. Security and Risk Management (Part 2) by Sam Bowne
CNIT 125: Ch 2. Security and Risk Management (Part 2)CNIT 125: Ch 2. Security and Risk Management (Part 2)
CNIT 125: Ch 2. Security and Risk Management (Part 2)
Sam Bowne388 views
7. Security Operations by Sam Bowne
7. Security Operations7. Security Operations
7. Security Operations
Sam Bowne570 views

Similar to CNIT 160: Ch 2a: Introduction to Information Security Governance

Building an effective Information Security Roadmap by
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security RoadmapElliott Franklin
27.1K views47 slides
it grc by
it grc it grc
it grc 9535814851
2.3K views73 slides
Nist 800 53 deep dive 20210813 by
Nist 800 53 deep dive 20210813Nist 800 53 deep dive 20210813
Nist 800 53 deep dive 20210813Kinetic Potential
149 views13 slides
CISM_WK_1.pptx by
CISM_WK_1.pptxCISM_WK_1.pptx
CISM_WK_1.pptxdotco
15 views42 slides
CDMP SLIDE TRAINER .pptx by
CDMP SLIDE TRAINER .pptxCDMP SLIDE TRAINER .pptx
CDMP SLIDE TRAINER .pptxssuser65981b
74 views214 slides
Mandelaris_SecureWorld_2016_FINAL by
Mandelaris_SecureWorld_2016_FINALMandelaris_SecureWorld_2016_FINAL
Mandelaris_SecureWorld_2016_FINALChristopher Mandelaris
141 views21 slides

Similar to CNIT 160: Ch 2a: Introduction to Information Security Governance(20)

Building an effective Information Security Roadmap by Elliott Franklin
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security Roadmap
Elliott Franklin27.1K views
it grc by 9535814851
it grc it grc
it grc
95358148512.3K views
CISM_WK_1.pptx by dotco
CISM_WK_1.pptxCISM_WK_1.pptx
CISM_WK_1.pptx
dotco15 views
CDMP SLIDE TRAINER .pptx by ssuser65981b
CDMP SLIDE TRAINER .pptxCDMP SLIDE TRAINER .pptx
CDMP SLIDE TRAINER .pptx
ssuser65981b74 views
ISO27001: Implementation & Certification Process Overview by Shankar Subramaniyan
ISO27001: Implementation & Certification Process OverviewISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process Overview
Shankar Subramaniyan14.2K views
You Need a Data Catalog. Do You Know Why? by Precisely
You Need a Data Catalog. Do You Know Why?You Need a Data Catalog. Do You Know Why?
You Need a Data Catalog. Do You Know Why?
Precisely436 views
GDPR | Cyber security process resilience by Rishi Kant
GDPR | Cyber security process resilienceGDPR | Cyber security process resilience
GDPR | Cyber security process resilience
Rishi Kant158 views
CISSP Prep: Ch 1: Security Governance Through Principles and Policies by Sam Bowne
CISSP Prep: Ch 1: Security Governance Through Principles and PoliciesCISSP Prep: Ch 1: Security Governance Through Principles and Policies
CISSP Prep: Ch 1: Security Governance Through Principles and Policies
Sam Bowne5.5K views
Mergers Acquisitions and Tech Due Diligence by Sharanjeet Kaur
Mergers Acquisitions and Tech Due DiligenceMergers Acquisitions and Tech Due Diligence
Mergers Acquisitions and Tech Due Diligence
Sharanjeet Kaur202 views
Maclear’s IT GRC Tools – Key Issues and Trends by Maclear LLC
Maclear’s  IT GRC Tools – Key Issues and TrendsMaclear’s  IT GRC Tools – Key Issues and Trends
Maclear’s IT GRC Tools – Key Issues and Trends
Maclear LLC1K views
AI Data Acquisition and Governance: Considerations for Success by Databricks
AI Data Acquisition and Governance: Considerations for SuccessAI Data Acquisition and Governance: Considerations for Success
AI Data Acquisition and Governance: Considerations for Success
Databricks206 views
ISO 27001 Awareness IGN Mantra 2nd Day, 2nd Session. by IGN MANTRA
ISO 27001 Awareness IGN Mantra 2nd Day, 2nd Session.ISO 27001 Awareness IGN Mantra 2nd Day, 2nd Session.
ISO 27001 Awareness IGN Mantra 2nd Day, 2nd Session.
IGN MANTRA303 views
Ch2-CIISA_IT Governance.pdf by DanteHayashi
Ch2-CIISA_IT Governance.pdfCh2-CIISA_IT Governance.pdf
Ch2-CIISA_IT Governance.pdf
DanteHayashi12 views
Drive Smarter Decisions with Big Data Using Complex Event Processing by Perficient, Inc.
Drive Smarter Decisions with Big Data Using Complex Event ProcessingDrive Smarter Decisions with Big Data Using Complex Event Processing
Drive Smarter Decisions with Big Data Using Complex Event Processing
Perficient, Inc.3.3K views
Data architecture around risk management by Suvradeep Rudra
Data architecture around risk managementData architecture around risk management
Data architecture around risk management
Suvradeep Rudra2K views

More from Sam Bowne

Cyberwar by
CyberwarCyberwar
CyberwarSam Bowne
14 views22 slides
3: DNS vulnerabilities by
3: DNS vulnerabilities 3: DNS vulnerabilities
3: DNS vulnerabilities Sam Bowne
40 views40 slides
8. Software Development Security by
8. Software Development Security8. Software Development Security
8. Software Development SecuritySam Bowne
22 views85 slides
4 Mapping the Application by
4 Mapping the Application4 Mapping the Application
4 Mapping the ApplicationSam Bowne
62 views88 slides
3. Attacking iOS Applications (Part 2) by
 3. Attacking iOS Applications (Part 2) 3. Attacking iOS Applications (Part 2)
3. Attacking iOS Applications (Part 2)Sam Bowne
33 views45 slides
12 Elliptic Curves by
12 Elliptic Curves12 Elliptic Curves
12 Elliptic CurvesSam Bowne
51 views50 slides

More from Sam Bowne(20)

3: DNS vulnerabilities by Sam Bowne
3: DNS vulnerabilities 3: DNS vulnerabilities
3: DNS vulnerabilities
Sam Bowne40 views
8. Software Development Security by Sam Bowne
8. Software Development Security8. Software Development Security
8. Software Development Security
Sam Bowne22 views
4 Mapping the Application by Sam Bowne
4 Mapping the Application4 Mapping the Application
4 Mapping the Application
Sam Bowne62 views
3. Attacking iOS Applications (Part 2) by Sam Bowne
 3. Attacking iOS Applications (Part 2) 3. Attacking iOS Applications (Part 2)
3. Attacking iOS Applications (Part 2)
Sam Bowne33 views
12 Elliptic Curves by Sam Bowne
12 Elliptic Curves12 Elliptic Curves
12 Elliptic Curves
Sam Bowne51 views
11. Diffie-Hellman by Sam Bowne
11. Diffie-Hellman11. Diffie-Hellman
11. Diffie-Hellman
Sam Bowne58 views
2a Analyzing iOS Apps Part 1 by Sam Bowne
2a Analyzing iOS Apps Part 12a Analyzing iOS Apps Part 1
2a Analyzing iOS Apps Part 1
Sam Bowne42 views
9 Writing Secure Android Applications by Sam Bowne
9 Writing Secure Android Applications9 Writing Secure Android Applications
9 Writing Secure Android Applications
Sam Bowne31 views
12 Investigating Windows Systems (Part 2 of 3) by Sam Bowne
12 Investigating Windows Systems (Part 2 of 3)12 Investigating Windows Systems (Part 2 of 3)
12 Investigating Windows Systems (Part 2 of 3)
Sam Bowne30 views
12 Investigating Windows Systems (Part 1 of 3 by Sam Bowne
12 Investigating Windows Systems (Part 1 of 312 Investigating Windows Systems (Part 1 of 3
12 Investigating Windows Systems (Part 1 of 3
Sam Bowne59 views
9. Hard Problems by Sam Bowne
9. Hard Problems9. Hard Problems
9. Hard Problems
Sam Bowne43 views
8 Android Implementation Issues (Part 1) by Sam Bowne
8 Android Implementation Issues (Part 1)8 Android Implementation Issues (Part 1)
8 Android Implementation Issues (Part 1)
Sam Bowne23 views
11 Analysis Methodology by Sam Bowne
11 Analysis Methodology11 Analysis Methodology
11 Analysis Methodology
Sam Bowne12 views
8. Authenticated Encryption by Sam Bowne
8. Authenticated Encryption8. Authenticated Encryption
8. Authenticated Encryption
Sam Bowne70 views
7. Attacking Android Applications (Part 2) by Sam Bowne
7. Attacking Android Applications (Part 2)7. Attacking Android Applications (Part 2)
7. Attacking Android Applications (Part 2)
Sam Bowne35 views
7. Attacking Android Applications (Part 1) by Sam Bowne
7. Attacking Android Applications (Part 1)7. Attacking Android Applications (Part 1)
7. Attacking Android Applications (Part 1)
Sam Bowne26 views
5. Stream Ciphers by Sam Bowne
5. Stream Ciphers5. Stream Ciphers
5. Stream Ciphers
Sam Bowne104 views
6 Scope & 7 Live Data Collection by Sam Bowne
6 Scope & 7 Live Data Collection6 Scope & 7 Live Data Collection
6 Scope & 7 Live Data Collection
Sam Bowne120 views

Recently uploaded

Sociology KS5 by
Sociology KS5Sociology KS5
Sociology KS5WestHatch
65 views23 slides
Lecture: Open Innovation by
Lecture: Open InnovationLecture: Open Innovation
Lecture: Open InnovationMichal Hron
99 views56 slides
7 NOVEL DRUG DELIVERY SYSTEM.pptx by
7 NOVEL DRUG DELIVERY SYSTEM.pptx7 NOVEL DRUG DELIVERY SYSTEM.pptx
7 NOVEL DRUG DELIVERY SYSTEM.pptxSachin Nitave
59 views35 slides
Classification of crude drugs.pptx by
Classification of crude drugs.pptxClassification of crude drugs.pptx
Classification of crude drugs.pptxGayatriPatra14
83 views13 slides
Recap of our Class by
Recap of our ClassRecap of our Class
Recap of our ClassCorinne Weisgerber
74 views15 slides
Community-led Open Access Publishing webinar.pptx by
Community-led Open Access Publishing webinar.pptxCommunity-led Open Access Publishing webinar.pptx
Community-led Open Access Publishing webinar.pptxJisc
91 views9 slides

Recently uploaded(20)

Sociology KS5 by WestHatch
Sociology KS5Sociology KS5
Sociology KS5
WestHatch65 views
Lecture: Open Innovation by Michal Hron
Lecture: Open InnovationLecture: Open Innovation
Lecture: Open Innovation
Michal Hron99 views
7 NOVEL DRUG DELIVERY SYSTEM.pptx by Sachin Nitave
7 NOVEL DRUG DELIVERY SYSTEM.pptx7 NOVEL DRUG DELIVERY SYSTEM.pptx
7 NOVEL DRUG DELIVERY SYSTEM.pptx
Sachin Nitave59 views
Classification of crude drugs.pptx by GayatriPatra14
Classification of crude drugs.pptxClassification of crude drugs.pptx
Classification of crude drugs.pptx
GayatriPatra1483 views
Community-led Open Access Publishing webinar.pptx by Jisc
Community-led Open Access Publishing webinar.pptxCommunity-led Open Access Publishing webinar.pptx
Community-led Open Access Publishing webinar.pptx
Jisc91 views
Create a Structure in VBNet.pptx by Breach_P
Create a Structure in VBNet.pptxCreate a Structure in VBNet.pptx
Create a Structure in VBNet.pptx
Breach_P72 views
Class 10 English notes 23-24.pptx by TARIQ KHAN
Class 10 English notes 23-24.pptxClass 10 English notes 23-24.pptx
Class 10 English notes 23-24.pptx
TARIQ KHAN125 views
EIT-Digital_Spohrer_AI_Intro 20231128 v1.pptx by ISSIP
EIT-Digital_Spohrer_AI_Intro 20231128 v1.pptxEIT-Digital_Spohrer_AI_Intro 20231128 v1.pptx
EIT-Digital_Spohrer_AI_Intro 20231128 v1.pptx
ISSIP359 views
JiscOAWeek_LAIR_slides_October2023.pptx by Jisc
JiscOAWeek_LAIR_slides_October2023.pptxJiscOAWeek_LAIR_slides_October2023.pptx
JiscOAWeek_LAIR_slides_October2023.pptx
Jisc93 views
Dance KS5 Breakdown by WestHatch
Dance KS5 BreakdownDance KS5 Breakdown
Dance KS5 Breakdown
WestHatch69 views
Drama KS5 Breakdown by WestHatch
Drama KS5 BreakdownDrama KS5 Breakdown
Drama KS5 Breakdown
WestHatch73 views
AI Tools for Business and Startups by Svetlin Nakov
AI Tools for Business and StartupsAI Tools for Business and Startups
AI Tools for Business and Startups
Svetlin Nakov105 views
The Open Access Community Framework (OACF) 2023 (1).pptx by Jisc
The Open Access Community Framework (OACF) 2023 (1).pptxThe Open Access Community Framework (OACF) 2023 (1).pptx
The Open Access Community Framework (OACF) 2023 (1).pptx
Jisc107 views

CNIT 160: Ch 2a: Introduction to Information Security Governance