SlideShare a Scribd company logo
1 of 34
ISYS 2394 Business Globalisation and Business IT
Security in a Global Environment
Barry Cook
*
Index
*
Security in a Global Environment
Introduction
Introduction
My Background
Disclaimer
Security in a Globalised Environment
Impact of Data Breaches
Largest Data Breaches of All Time
Security Threat Basics
Emerging IT Trends Security Considerations
Defences and Best Practices
Summary
Security in a Global Environment
*
IntroductionThe objective of today is to:
Provide you an overview of the current major security threats,
risks and impacts to individuals and businesses, in our
globalised world
Provide you some high level best practices and defences to
address security threats and risks
Get you to starting to think about security as an integral part of
your development plans
Today
Part 1: Lecture and Questions
Part 2: Practical Activity with 3 Minute Presentation Per Group
*
Security in a Global Environment
Security in a Global Environment
*
My BackgroundCurrent Role:
J6, Defence Command Support Training Centre (DCSTC)
J = Joint (Army, Navy, Air Force),
6 = Communication Information Systems (CIS)Experience
National Security Focus Department of Defence & Federal
Attorney-General’s Department
Management / IT ConsultancyCurrent Research Interests
Cyber-Security & Cyber-Warfare
*
Security in a Global Environment
Security in a Global Environment
*
Disclaimer
Everything you hear today is based on material available in the
public domain.
Nothing Specific, Unique or Classified to the Department of
Defence, Australian Government or our Allies will be discussed
or referenced.
*
Security in a Global Environment
Security in a Global Environment
*
Security in a Globalised EnvironmentTechnology has opened up
Global Opportunities and Markets
It has also lead to a significant increase in the Security Threats
to Individuals and Businesses
Mobile Devices estimated to reach 10 Billion by 20161
Accumulated Digital Data to grow to 8 Zettabytes by 20152
Distributed nature of the threats, makes it difficult for Law
Enforcement to address root causes.
Threat often occur from multiple sovereignties each with
differing laws and jurisdictional processes
You can’t just block all the traffic, as it is often mixed in with
legitimate traffic
*
Security in a Global Environment
Source: 1. Cisco
2. IDC Worldwide Big Data Technology and Service
2012-2015 Forecast
Security in a Global Environment
*
Impact of Data BreachesLoss of Customer Confidence and Loss
of CustomersLoss of Competitive AdvantageFraudFinesCost of
Data Breaches on Business1
$188 per record stolen in 2013
Cost of Identify Theft on Individuals2
Average Cost of $4,841 per person
Average Time to Repair Damage caused by Identify Theft is 330
Hours
*
Security in a Global Environment
Source: 1. 2013 Cost of Data Breach Study, Ponemon Institute
2. Identify Theft Resource Centre
Average Total Organisation Cost of Data Breach
for Large Business1
Security in a Global Environment
*
Largest Data Breaches of All Time
*
Security in a Global Environment
Source: 1. Nathan Yau, http://flowingdata.com
Security in a Global Environment
*
Index
*
Security in a Global Environment
Introduction
Security Threat Basics
Emerging IT Trends Security Considerations
Defences and Best Practices
Summary
Threat Motives
Threat Actors
Threat Vectors
Technical Threats
Non-Technical Threats
Security in a Global Environment
*
Threats MotivesFinancial Gain
Competitive Advantage
Disruption
Political Advantage / Hacktivism
Disobedience / Protest
Showing Off / “THE CHALLENGE”
*
Security in a Global Environment
Security in a Global Environment
*
Threats ActorsOrganised Crime
Financial Gain
State Sponsored / Foreign Government
Espionage, Disruption
Terrorist Groups
Financial Gain, Disruption
Individuals
Internal – Disgruntled Employee, Curious Insider, Ignorance
Outsider – Hackers, “Script Kiddies”, Competitors
*
Security in a Global Environment
Security in a Global Environment
*
Threats VectorsWeb – Fake SitesEmail – Attachments,
LinksUnsecure Devices – Wireless Hotspots, Physical
DevicesRemovable Media (USB Thumb Drives)Social
MediaSocial Engineering
*
Security in a Global Environment
Source: 1. Symantec Intelligence Report for Feb 2014
1
Security in a Global Environment
*
Technical Threats - PhishingPhishing
Fake Website designed to look like real one to obtain privilege
information
Generic in Nature
Email / Social Networking Attack VectorSpear Phishing
Targets Individuals based on already known information about
the target
May appear to come from a trusted source
*
Security in a Global Environment
Source: 1. Symantec Intelligence Report for Feb 2014
In Dec 2013, it was estimated 1 in every 1,053 emails was a
Phishing attempt.1
Security in a Global Environment
*
Technical Threats -
MalwareTrojansVirusesSpywareAdwareWormsScarewareBotnet
sSoftware Keyloggers
*
Security in a Global Environment
Source: 1. PandaLabs Annual Report 2013 Summary
2. Symantec Intelligence Report for Feb 2014
In Dec 13, it was estimated 1 in every 164 emails contained
Malware2
1
Security in a Global Environment
*
Technical Threats - Hardware Keyloggers
*
Security in a Global Environment
Security in a Global Environment
*
Technical Threats – Zero-Day AttacksZero-Day Attacks
Attacks that exploits a security vulnerability on the day or even
before it becomes generally known
Type of Advanced Persistent Threat (APT)
Famous Examples
Attack on Google in 2009 as a result of a Internet Explorer
Zero-Day Flaw.
HEART BLEED OpenSSL Vulnerability
*
Security in a Global Environment
Source: 1. Symantec Elderwood Project
1
Security in a Global Environment
*
Technical Threats - Heartbleed Bug
*
Security in a Global Environment
Source: 1. LWG Consulting
1
Security in a Global Environment
*
Non Technical Threats – PasswordsPoor Passwords
Lack Length and Complexity
Hard to Remember so written down
Password Lengths
Any Password < 5 Characters can be cracked in 5 seconds
Any Password < 7 Characters can be cracked within 1 day
Even 8 Character Passwords with some complexity can be
cracked in a few months
*
Security in a Global Environment
Security in a Global Environment
*
Non Technical Threats – OtherPhysical Security
Lack of Protection of Sensitive and Critical ICT Assets
Includes End User Device Protection when MobileImproper
Destruction
Paper and Electronic AssetsInsufficient Backup and Recovery
Risk to Data Survivability and IntegrityInadequate Staff
Identification Processes
Susceptibility to Social Engineering Attack Vector
*
Security in a Global Environment
Security in a Global Environment
*
Index
*
Security in a Global Environment
Introduction
Security Threat Basics
Emerging IT Trends Security Considerations
Defences and Best Practices
Summary
Cloud Computing
BYOD
Mobile Devices
Big Data
Security in a Global Environment
*
Cloud ComputingWhat about my Data
Where is My Data stored?
Who has access to My Data?Data Segregation
How well is my Data Segregated from others Cloud
Clients?Recovery
What are my Recovery Options?Compliance Requirements
Can I guarantee they are achieved if I don’t control the
infrastructure?
*
Security in a Global Environment
Security in a Global Environment
*
Bring Your Own Device (BYOD)All Devices or Only Some?
What about Patching and Updates?
How will you deploy applications to all the devices?Data
Ownership
What happens when the employee leaves?Device Loss or Theft
How do you maintain control?
What about User Rights?
*
Security in a Global Environment
Security in a Global Environment
*
Mobile DevicesMobile Devices are just as susceptible to threats
Malware
Bluesnarfing
Phone Hacking
Browser Security Issues
*
Security in a Global Environment
Source: 1. F-secure Mobile Threat Report Q1 2014
Mobile Device Malware Detected
Q1 20141
Security in a Global Environment
*
Index
*
Security in a Global Environment
Introduction
Security Basics
Emerging IT Trends Security Considerations
Defences and Best Practices
Summary
Defence in Depth CycleLayered DefenceSecurity MeasuresTop
4 Mitigation StrategiesMobile / BYOD Security Control
FrameworkCloud Computer Security
Security in a Global Environment
*
Defence in Depth CycleContext
Business Strategy in PlayRisk Analysis
Identify Generic and Specific Risks to Business and its
consequencesImplement Defence in Depth
Employ a Multi-Layer Defence StrategyReview and Monitor
Ensure Defence Strategy is continuous reviewed and updated
*
Security in a Global Environment
AS43560 Risk Rating Levels
Source: 1. Trusted Information Sharing Network
www.tisn.gov.au
Security in a Global Environment
*
Layered Defence
*
Security in a Global Environment
Source: 1. Trusted Information Sharing Network
www.tisn.gov.au
Security in a Global Environment
*
Security Measures – Physical SecuritySecure Server Rooms
Restrict Access to only those that require and log/monitor
access at all times
Keep Server Rooms neat and documented, so anomalies can be
quickly detectedRestrict Entry to Work Areas to only authorised
personnelSecure Mobile Assets
In and Out of the OfficeControl Physical Assets that contain
data and information at all times
From Creation to Destruction
*
Security in a Global Environment
Security in a Global Environment
*
Security Measures – Device SecurityPatch Operating System
and Applications consistently and quickly.
Setup an Automatic Mechanism to updateInstall Suitable
Security Software
Should include Anti-virus, Firewall, Anti-Spam, Anti-Malware,
Web Site Threat Checker
Needs to check for updates multiple times per dayEncrypt Data
on Portable DevicesRestrict Application Installation/Usage to
Only Authorised ApplicationsDisable Auto Run / Auto Load of
Removal Media
*
Security in a Global Environment
Security in a Global Environment
*
Security Measures – Network/System SecurityApply Multiple
Levels of Network Defence
Firewalls / Routers / Gateways
Intrusion Detection SystemsMonitor Network Continuously and
Quickly Act to Protect
Know what devices are on your network at all times and what
they are doingApply comprehensive Access Controls to Data
Consider Multi-Factor Authentication such as Tokens, Smart
Cards or Biometrics
Remove Access immediately upon personnel change (Staff
Departure, Role Change)Implement Robust Change Management
and Application Development SDLC Processes
*
Security in a Global Environment
Security in a Global Environment
*
Security Measures – User SecuritySecurity Awareness Training
Threat and Consequence Awareness Training
Anti-Phishing and Anti-Social Engineering Training
What to do if a “Breach” occursSuitable Password
At least 10 Characters with mixture of Upper & Lower Case,
Numbers and Special Characters.
However, the longer the password length the less complex it has
to be.
Use different passwords for different types of systems. E.g.
Social Media, Banking
Change Passwords Regularly
Don’t Share Passwords
*
Security in a Global Environment
Security in a Global Environment
*
Top 4 Mitigation Strategies
*
Security in a Global Environment
Source: 1. DSD Top 35 Strategies to Mitigate Targeted Cyber
Intrusions
1Mitigation Strategy Effectiveness RankingMitigation
StrategyDesigned to Prevent or Detect an IntrusionUser
ResistanceUpfront CostMaintenance Cost1Patch applications
e.g. PDF viewer, Flash Player, Microsoft Office and Java. Patch
or mitigate within two days for high risk vulnerabilities. Use
the latest version of applications.PreventLowHighHigh2Patch
operating system vulnerabilities. Patch or mitigate within two
days for high risk vulnerabilities. Use the latest operating
system version.PreventLowMediumMedium3Minimise the
number of users with domain or local administrative privileges.
Such users should use a separate unprivileged account for email
and web browsing.PreventMediumMediumLow4Application
whitelisting to help prevent malicious software and other
unapproved programs from running e.g. by using Microsoft
Software Restriction Policies or
AppLocker.BothMediumHighMedium
Security in a Global Environment
*
Mobile / BYOD Security Control Framework
*
Security in a Global Environment
Source: 1. Trusted Information Sharing Network
www.tisn.gov.au
1Security ControlsPreventiveDetectiveCorrectiveAccess
ControlEnforce strong passwords
Use two-factor authenticationExtend existing auditing and
monitoring controls around mobile device connectionsConduct
regular reviews of devices connecting to corporate networkData
ProtectionEncrypt business data
Limit the sensitive data transferred to mobile devices, or
implement least privilege access
Implement remote device management
Enable device-lockout function when the device is not in
usePerform technical security assessments on mobile devices
and supporting infrastructure with emphasis on data stored on
devices
Monitor access and usage of high-risk data to identify
potentially inappropriate usageImplement appropriate measures
to eliminate or reduce the risk impact - either by enhancements
in technology or by updating the policies/proceduresApplication
SecurityAllow only certified business applicationsRegularly
monitor installed applications to identify risks to corporate
dataRemove applications identified to be untrustworthy or
maliciousFundamental ControlsInstall anti malware software
Install and manage personal firewall to permit only authorised
trafficRegularly monitor compliance reports
Setup alerts to identify changesEradicate and/or repair any
devices identified to be non-complaint from company defined
policyGovernance and ComplianceInclude mobile security into
the organisations risk management program
Add mobile security awareness to existing employee awareness
programs
Implement mobile device policies and include them in them in
the Acceptable Use PoliciesAdd mobile devices in the
organisations audit program
Monitor and maintain logs of mobile device interactions with
corporate network Address and mitigate any non-compliance
Incorporate mobile devices into incident response plan
Regularly review mobile device acquisition and usage
Security in a Global Environment
*
Cloud Computing SecurityFully Understand the Cloud Providers
Environment
Service Levels
Where you Data will be stored.
Access rights to Government under local laws where that data
will be stored
Data Transfer Options should you want to move to another
provider
Data Retention PeriodsEncrypt your Data
Particularly for Sensitive Data
Should be Independent of Current Cloud Provider
*
Security in a Global Environment
Security in a Global Environment
*
Index
*
Security in a Global Environment
Introduction
Security Basics
Emerging IT Trends Security Considerations
Defences and Best Practices
Summary
Key Points
Additional Resources
Security in a Global Environment
*
Key PointsUnderstand the Threats and Consequences
General threats and those specific to your businessFactor
Security into your Development Plans
Engage with your Security ExpertsPatch your Operating
Systems and Applications regularlyDeploy and Maintain
Security Software on your DevicesSecure your Physical and
Information AssetsRegularly conduct Security Awareness
Training
*
Security in a Global Environment
Security in a Global Environment
*
*
Security in a Global Environment
Security in a Global Environment
*
Additional Reading / SupportAustralian Signals Directorate
http://www.asd.gov.au/publications/index.htmTrusted
Information Sharing Network
http://www.tisn.gov.au/Pages/default.aspxUS-CERT
http://www.us-cert.govSymantec Intelligence Report
http://www.symantec.com/theme.jsp?themeid=state_of_spamSA
NS Security
http://www.sans.org/reading_room/whitepapers/bestprachttp://w
ww.sans.org/tip_of_the_day.phpAnti-Phishing Working Group
http://www.antiphishing.org/
*
Security in a Global Environment
Security in a Global Environment
*
Globalization and Business IT
Week One
Dr Claire Davison
AgendaGetting to know your classmatesIn-depth discussion of
the assessment tasksgroup formation for
assignmentReferencingTurnItIn
Where do you live?NorthSouthEastWestCBD
Course Co-ordinatorDr Paul R Cerroti
[email protected]
Course guide
Assignment OneYour first assignment is a reflective writing
exercise about a specific topic pertaining to Global business and
IT.
Specifically, you are required to reflect on the sessions two,
three and four of this course:Globalisation and Business
ITSocial MediaThe Role of IT in Global Business
Assignment OneDue: Week 5Tuesday 19 August 2014 in
class ORFriday 22 August 2014 in classMarks allocated: 10% of
final mark
Reflective Journal Writing
Prepared by Lila Kemlo
Manager Student Learning Support
What is Reflective Practiceprocess of thinking about
experiences, often new, with a view to learning from them a
form of personal response to experiences, situations, events or
information by reflecting on their meaning. This process
enables you to better understand what you have learned and to
gain new insights about yourself, others, and situations. These
new insights may result in a change of behaviour, perspective or
new action. There is neither a right nor a wrong way of
reflective thinking, there are just questions to explore.
What is the purpose of reflective journal writing
To record the development of your ideas and insights, concepts,
experiencesTo reflect on these thoughts and experiences as a
means of increasing your understanding of both yourself and
what you are observing To analyse what you learn and your self
development – may lead to change
What are the benefits of reflective practice?Life skill – by
documenting experiences, thoughts, questions, ideas – develop
an approach to thinking and learning - able to be transferred to
all aspects of life observe, analyse & reflect your responses to
situations opportunity to challenge ourselves, what we do and to
explore ways to do it differently and better understand course
material & gain skills related to your disciplinerecognise the
acquired knowledge & skills developedenhance your
employability as these skills are invaluable and attractive in the
workplace and to potential employers.
Reflective writing is NOTjust conveying information,
instruction or argument pure description, though there may be
descriptive elements straightforward decision or judgement (e.g.
about whether something is right or wrong, good or bad) simple
problem-solving a summary of course notes a standard
university essay
*
The Learning Cycle
Source: Adapted from Kolb’s Learning Cycle 1984 by the Study
and Learning Centre 2002
Record (what)
.
Reflect (think)
Analyse
(explain & gain insight)
New action
Simplified Learning Cycle
Step 1 in Learning Cycle: Record whatSummaries of the main
points from the guest speakers’ presentationsImmediate
thoughts/responses to what you are hearing from the
speakersDescribe the experience you are having while listening
to the speaker
Step 2 in Learning Cycle: Reflect (think)Which speakers had
the greatest impact on me? Why?What were the areas from
their presentations that influenced my thinking? In Business?
On self?How did I relate what the speakers said compared to
what I believed/thought prior to the presentation (Relevance to
me...beliefs, values, attitudes, assumptions)Did the speakers
demonstrate any common characteristics/themes? What were
they?How did what I heard link in with what I am
studyingWhere there any surprises/challenges for me? What
were they?
Step 3 in Learning Cycle: AnalysisAnalysis in a reflective
journal may involve three things:
- Analysis of experience or content
- Integration of experience with theory
- Demonstration of improved awareness and self-
development
Step 3 in Learning Cycle: AnalysisWhat questions you have
since that experience?What can I use and apply from this
experience in my business practice/ management/life?What I
have learned about myself?What have I learned about the ways
in which I interact with others?What aspects of myself could I
change/ develop as a result of what I have learned?Conclusions
you have drawn.
Step 4 in Learning Cycle: New ActionComparisons and
connections between your prior assumptions, preconceptions
and prior knowledge your new knowledge and experience How
new ideas challenge what you already know What will I change
about.....How will I go about changing......How will I
monitor/evaluate the effectiveness of these changes?
Style of writingMostly subjective. In addition to being
reflective and logical, you can be personal, hypothetical,
critical and creative. Write in the first person.includes
description (what, when, who) and analysis (how, why, what
if)…. often resulting in more questions than answers. A
reflective task may allow you to use different modes of writing
and language: descriptive (outlining what something is or how
something was done) explanatory (explaining why or how it is
like that) expressive (I think, I feel, I believe) questioningKeep
colloquial language to a minimum (eg, ‘kid’, ‘bloke’, ‘stuff’).
*
reflective writing is mostly subjective. Therefore in addition to
being reflective and logical, you can be personal, hypothetical,
critical and creative. You can comment based on your
experience, rather than limiting yourself to academic evidence.
Reflective writing is an activity that includes description (what,
when, who) and analysis (how, why, what if). It is an
explorative tool often resulting in more questions than answers.
A reflective task may allow you to use different modes of
writing and language:
descriptive (outlining what something is or how something was
done)
explanatory (explaining why or how it is like that)
expressive (I think, I feel, I believe)
Use full sentences and complete paragraphs
You can usually use personal pronouns like 'I', 'my' or 'we'
Keep colloquial language to a minimum (eg, kid, bloke, stuff)
REFLECTIVE WRITINGDEIP handoutUsing the four steps of
reflection:Who is someone you admire and what does it mean to
you?
BRW Research Report (Individual or Group)
Students will select an organization of their choice and conduct
one or two site visits, interview the relevant person(s) and write
a magazine article regarding the organization as a whole or a
department of the organization.This article should be written
with the intention that it will be published in BUSINESS
REVIEW WEEKLY.
Assignment TwoDue date: Tuesday 23 September or Friday 26
September (submit in the class you are enrolled in)Worth:
40%Length: 4000 wordsGroup: No more than 2 people or
individual
Choosing an organisationIn choosing an organization students
should carefully consider the need to address the specific
requirements of the assessment. The choice of organization is
very important. If in doubt please contact the lecturer.In your
choice, also consider an organization, which is of manageable
size and complexity for the project.When approaching an
organization, it is essential that you make it clear that the
project is for educational purposes only, and forms part of your
assessment ISYS 2394 Globalization and Business IT
Choosing an organisationName some organisations?What
networks do you have?Who do I contact in an
organisation?Look on the websiteMedia relations or PR
departmentHuman resources department
1001 facets of business …Where to begin?Lecture topicsWhat
interests you?Read magazines and newspapers to see what the
current topics are …What are some current business
trends?Your topic can be about the business or the person (a
profile). Some good assignments have been about the personal
experiences of successful business people
Business Review Weeklyhttp://www.brw.com.au/Some articles
are focused on:3 myths about your millenial staff,
busted.Avocado smoothie, anyone? How Boost Juice and Sumo
Salad have expanded offshoreIf physical retail is dying,
someone forgot to tell Dick Smith CEO Nick Abboud
Other sources Fast CompanyWiredInc.Forbes
1001 facets of businessSome topics we have had in the
past:Cross cultural management in International hotelCareer
path of celebrity chefChinese female
entrepreneurAccommodation entrepreneursOarsome Foursome
(Olympic rowers)Lord Mayor of Melbourne John
SoEntrepreneur story - Paul RubensSystem implementation at
SAP
*
How to get started on the report?Brainstorm ideasInvestigate
networkRead, read, readTalk to peopleYou will need to
collectSecondary data (Background information)Primary data
(via interviews/surveys)
*
Some advantages of qualitative
methodsUnderstanding/explaining personal experiences of
individualsFocus on subjects' own understanding and
interpretations Researcher experiences issues from a
participant's perspectiveReports presented in a narrative rather
than a statistical form – more interesting/understandable for
non-experts Useful in examining personal changes over
timeFocus on human-interest issues that are meaningful to
managers
*
Some qualitative methodsIn-depth interviewsSmall number of
subjects Checklist rather than a formal questionnaireTape-
recording + verbatim transcript30 minutes to several hours;
repeat interviews possible.
Group interviews/focus groupsConducted with a
groupInteraction between subjects + interaction between
interviewer and subject.
Collecting your informationRead about the topic and
organisation before you go to the interview. Be prepared.You
will need to organise an interview with the relevant
person/people in the organisation you have chosen.
A well planned 30 minute interview should use about eight to
ten questions, any more and you’re not allowing the subject
enough time to elaborate. To create a 4000 word paper you’ll
probably need one hour (around 15 questions).
You may need to be flexible with time and content
*
Wording of questionsavoid jargonsimplify wherever
possibleavoid ambiguityavoid leading questionsask only one
question at a time (avoid multi-purpose questions)
*
Asking your questionsStart with easy questionsStart with
'relevant' questionsLeave sensitive questions until later Be
aware of reader/user – interviewer or respondent?Compactness
(eg. single page) = ease of handling
*
How to write an article
Create an outline for your article
Your article should include a headline, introduction, body,
conclusion and resource box
Headline - make this as catchy as possible because your reader
will read this first and decide if they will continue reading the
rest of the article. i.e. "7 Highly Effective Ways to Gain Instant
Traffic to Your Web Site".
Introduction - introduce the topic you will be discussing in your
article or write a short story of your experience with the
topic/issue.
*
Planning and Drafting – What not to doDon’t just summarize
sourcesDon’t string quotes together and hope that it tells the
story.Instead, add your analysis and thoughts surrounding that
quote.Don’t write in the form of “The first issue was … and this
was followed by …” (step-by-step narrative)Instead, focus on
the results and analysis of your research. This is the juicy
information and could be the story of your
analysis/results.Don’t plagiarize – use direct quotes or
paraphrase.
How to write an article
Body - discuss all the aspects of the topic that you outlined in
the introduction. Break up each point into separate paragraphs
and keep them to about 5 - 8 lines. You may want to create a
sub-heading for each point. This makes it easier to read as most
people will scan your article.
Show, not tell – this is the golden rule of all writers
How to write an article
Conclusion - this should include a brief summary of your article
and a call for the reader to take action. i.e. "Be sure to include
article marketing as one of the top strategies for promoting your
web site. It's a self generating marketing machine that produces
a constant flow of visitors".
Resource box - this is the place you can add extra information
about your topic that is not strictly linked to the article. Eg
background information about a topic
Write with style - write in an informal style, like you
would explain your topic to a friend but formal enough that it is
not written in the first person.
How to write an article
When you finish writing, put it aside for some time. Let your
mind cool off a little, and then try to take an independent look
at what you have written. If you can’t, ask your family
member/friend/anyone whose opinion you value to read your
article and give feedback.
Format of reportMust be formatted in the same way as a
magazine article The use of graphs, visuals and photographs are
essential to your piece of work.Content, layout, neatness,
originality of presentation are important to the overall final
product.
ReferencingHarvard style of referencing.Use online
resourcesEndnote
TurnItIn – http://www.turnitin.com
What are you interested in?Social MediaGlobal supply chain
and logisticsBusiness in ChinaOnline securityCross cultural
understanding in businessGlobalizationEthical issues in
business

More Related Content

Similar to ISYS 2394 Business Globalisation and Business IT.docx

E-Commerce Privacy and Security System
E-Commerce Privacy and Security SystemE-Commerce Privacy and Security System
E-Commerce Privacy and Security SystemIJERA Editor
 
E-Commerce Privacy and Security System
E-Commerce Privacy and Security SystemE-Commerce Privacy and Security System
E-Commerce Privacy and Security SystemIJERA Editor
 
An Empirical Study on Information Security
An Empirical Study on Information SecurityAn Empirical Study on Information Security
An Empirical Study on Information Securityijtsrd
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security BasicsMohan Jadhav
 
Free Guide-to-cybersecurity-fundamentals.pdf
Free Guide-to-cybersecurity-fundamentals.pdfFree Guide-to-cybersecurity-fundamentals.pdf
Free Guide-to-cybersecurity-fundamentals.pdfVarinder K
 
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection SystemIRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection SystemIRJET Journal
 
Take the First Steps Toward Endpoint Security Protection
Take the First Steps Toward Endpoint Security ProtectionTake the First Steps Toward Endpoint Security Protection
Take the First Steps Toward Endpoint Security ProtectionVTECH SOLUTION
 
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxCISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxmccormicknadine86
 
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxCISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxsleeperharwell
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptxKnownId
 
New Developments in Cybersecurity and Technology for RDOs: Howland
New Developments in Cybersecurity and Technology for RDOs: HowlandNew Developments in Cybersecurity and Technology for RDOs: Howland
New Developments in Cybersecurity and Technology for RDOs: Howlandnado-web
 
Chapter 1 introduction(web security)
Chapter 1 introduction(web security)Chapter 1 introduction(web security)
Chapter 1 introduction(web security)Kirti Ahirrao
 
The new era of Cyber Security IEC62443
The new era of Cyber Security IEC62443The new era of Cyber Security IEC62443
The new era of Cyber Security IEC62443WoMaster
 
Cyber Security Intelligence
Cyber Security IntelligenceCyber Security Intelligence
Cyber Security Intelligenceijtsrd
 
The Importance of Consolidating Your Infrastructure Security – by United Secu...
The Importance of Consolidating Your Infrastructure Security – by United Secu...The Importance of Consolidating Your Infrastructure Security – by United Secu...
The Importance of Consolidating Your Infrastructure Security – by United Secu...United Security Providers AG
 
Access Control For Local Area Network Performance Essay
Access Control For Local Area Network Performance EssayAccess Control For Local Area Network Performance Essay
Access Control For Local Area Network Performance EssayDotha Keller
 
Effective Cyber Security Technology Solutions for Modern Challenges
Effective Cyber Security Technology Solutions for Modern ChallengesEffective Cyber Security Technology Solutions for Modern Challenges
Effective Cyber Security Technology Solutions for Modern Challengescyberprosocial
 

Similar to ISYS 2394 Business Globalisation and Business IT.docx (20)

Cyber Security.pptx
Cyber Security.pptxCyber Security.pptx
Cyber Security.pptx
 
E-Commerce Privacy and Security System
E-Commerce Privacy and Security SystemE-Commerce Privacy and Security System
E-Commerce Privacy and Security System
 
E-Commerce Privacy and Security System
E-Commerce Privacy and Security SystemE-Commerce Privacy and Security System
E-Commerce Privacy and Security System
 
An Empirical Study on Information Security
An Empirical Study on Information SecurityAn Empirical Study on Information Security
An Empirical Study on Information Security
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
 
Free Guide-to-cybersecurity-fundamentals.pdf
Free Guide-to-cybersecurity-fundamentals.pdfFree Guide-to-cybersecurity-fundamentals.pdf
Free Guide-to-cybersecurity-fundamentals.pdf
 
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection SystemIRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
 
Take the First Steps Toward Endpoint Security Protection
Take the First Steps Toward Endpoint Security ProtectionTake the First Steps Toward Endpoint Security Protection
Take the First Steps Toward Endpoint Security Protection
 
IoT Security
IoT SecurityIoT Security
IoT Security
 
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxCISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
 
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxCISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptx
 
New Developments in Cybersecurity and Technology for RDOs: Howland
New Developments in Cybersecurity and Technology for RDOs: HowlandNew Developments in Cybersecurity and Technology for RDOs: Howland
New Developments in Cybersecurity and Technology for RDOs: Howland
 
Chapter 1 introduction(web security)
Chapter 1 introduction(web security)Chapter 1 introduction(web security)
Chapter 1 introduction(web security)
 
The new era of Cyber Security IEC62443
The new era of Cyber Security IEC62443The new era of Cyber Security IEC62443
The new era of Cyber Security IEC62443
 
Cyber Security Intelligence
Cyber Security IntelligenceCyber Security Intelligence
Cyber Security Intelligence
 
The Importance of Consolidating Your Infrastructure Security – by United Secu...
The Importance of Consolidating Your Infrastructure Security – by United Secu...The Importance of Consolidating Your Infrastructure Security – by United Secu...
The Importance of Consolidating Your Infrastructure Security – by United Secu...
 
Understanding Endpoint Security: A Guide For Everyone
Understanding Endpoint Security: A Guide For EveryoneUnderstanding Endpoint Security: A Guide For Everyone
Understanding Endpoint Security: A Guide For Everyone
 
Access Control For Local Area Network Performance Essay
Access Control For Local Area Network Performance EssayAccess Control For Local Area Network Performance Essay
Access Control For Local Area Network Performance Essay
 
Effective Cyber Security Technology Solutions for Modern Challenges
Effective Cyber Security Technology Solutions for Modern ChallengesEffective Cyber Security Technology Solutions for Modern Challenges
Effective Cyber Security Technology Solutions for Modern Challenges
 

More from priestmanmable

9©iStockphotoThinkstockPlanning for Material and Reso.docx
9©iStockphotoThinkstockPlanning for Material and Reso.docx9©iStockphotoThinkstockPlanning for Material and Reso.docx
9©iStockphotoThinkstockPlanning for Material and Reso.docxpriestmanmable
 
a 12 page paper on how individuals of color would be a more dominant.docx
a 12 page paper on how individuals of color would be a more dominant.docxa 12 page paper on how individuals of color would be a more dominant.docx
a 12 page paper on how individuals of color would be a more dominant.docxpriestmanmable
 
978-1-5386-6589-318$31.00 ©2018 IEEE COSO Framework for .docx
978-1-5386-6589-318$31.00 ©2018 IEEE COSO Framework for .docx978-1-5386-6589-318$31.00 ©2018 IEEE COSO Framework for .docx
978-1-5386-6589-318$31.00 ©2018 IEEE COSO Framework for .docxpriestmanmable
 
92 Academic Journal Article Critique  Help with Journal Ar.docx
92 Academic Journal Article Critique  Help with Journal Ar.docx92 Academic Journal Article Critique  Help with Journal Ar.docx
92 Academic Journal Article Critique  Help with Journal Ar.docxpriestmanmable
 
A ) Society perspective90 year old female, Mrs. Ruth, from h.docx
A ) Society perspective90 year old female, Mrs. Ruth, from h.docxA ) Society perspective90 year old female, Mrs. Ruth, from h.docx
A ) Society perspective90 year old female, Mrs. Ruth, from h.docxpriestmanmable
 
9 dissuasion question Bartol, C. R., & Bartol, A. M. (2017)..docx
9 dissuasion question Bartol, C. R., & Bartol, A. M. (2017)..docx9 dissuasion question Bartol, C. R., & Bartol, A. M. (2017)..docx
9 dissuasion question Bartol, C. R., & Bartol, A. M. (2017)..docxpriestmanmable
 
9 AssignmentAssignment Typologies of Sexual AssaultsT.docx
9 AssignmentAssignment Typologies of Sexual AssaultsT.docx9 AssignmentAssignment Typologies of Sexual AssaultsT.docx
9 AssignmentAssignment Typologies of Sexual AssaultsT.docxpriestmanmable
 
9 0 0 0 09 7 8 0 1 3 4 4 7 7 4 0 4ISBN-13 978-0-13-44.docx
9 0 0 0 09 7 8 0 1 3 4 4 7 7 4 0 4ISBN-13 978-0-13-44.docx9 0 0 0 09 7 8 0 1 3 4 4 7 7 4 0 4ISBN-13 978-0-13-44.docx
9 0 0 0 09 7 8 0 1 3 4 4 7 7 4 0 4ISBN-13 978-0-13-44.docxpriestmanmable
 
900 BritishJournalofNursing,2013,Vol22,No15©2.docx
900 BritishJournalofNursing,2013,Vol22,No15©2.docx900 BritishJournalofNursing,2013,Vol22,No15©2.docx
900 BritishJournalofNursing,2013,Vol22,No15©2.docxpriestmanmable
 
9 Augustine Confessions (selections) Augustine of Hi.docx
9 Augustine Confessions (selections) Augustine of Hi.docx9 Augustine Confessions (selections) Augustine of Hi.docx
9 Augustine Confessions (selections) Augustine of Hi.docxpriestmanmable
 
8.3 Intercultural CommunicationLearning Objectives1. Define in.docx
8.3 Intercultural CommunicationLearning Objectives1. Define in.docx8.3 Intercultural CommunicationLearning Objectives1. Define in.docx
8.3 Intercultural CommunicationLearning Objectives1. Define in.docxpriestmanmable
 
8413 906 AMLife in a Toxic Country - NYTimes.comPage 1 .docx
8413 906 AMLife in a Toxic Country - NYTimes.comPage 1 .docx8413 906 AMLife in a Toxic Country - NYTimes.comPage 1 .docx
8413 906 AMLife in a Toxic Country - NYTimes.comPage 1 .docxpriestmanmable
 
8. A 2 x 2 Experimental Design - Quality and Economy (x1 and x2.docx
8. A 2 x 2 Experimental Design - Quality and Economy (x1 and x2.docx8. A 2 x 2 Experimental Design - Quality and Economy (x1 and x2.docx
8. A 2 x 2 Experimental Design - Quality and Economy (x1 and x2.docxpriestmanmable
 
800 Words 42-year-old man presents to ED with 2-day history .docx
800 Words 42-year-old man presents to ED with 2-day history .docx800 Words 42-year-old man presents to ED with 2-day history .docx
800 Words 42-year-old man presents to ED with 2-day history .docxpriestmanmable
 
8.1 What Is Corporate StrategyLO 8-1Define corporate strategy.docx
8.1 What Is Corporate StrategyLO 8-1Define corporate strategy.docx8.1 What Is Corporate StrategyLO 8-1Define corporate strategy.docx
8.1 What Is Corporate StrategyLO 8-1Define corporate strategy.docxpriestmanmable
 
8.0 RESEARCH METHODS These guidelines address postgr.docx
8.0  RESEARCH METHODS  These guidelines address postgr.docx8.0  RESEARCH METHODS  These guidelines address postgr.docx
8.0 RESEARCH METHODS These guidelines address postgr.docxpriestmanmable
 
95People of AppalachianHeritageChapter 5KATHLEEN.docx
95People of AppalachianHeritageChapter 5KATHLEEN.docx95People of AppalachianHeritageChapter 5KATHLEEN.docx
95People of AppalachianHeritageChapter 5KATHLEEN.docxpriestmanmable
 
9 781292 041452ISBN 978-1-29204-145-2Forensic Science.docx
9 781292 041452ISBN 978-1-29204-145-2Forensic Science.docx9 781292 041452ISBN 978-1-29204-145-2Forensic Science.docx
9 781292 041452ISBN 978-1-29204-145-2Forensic Science.docxpriestmanmable
 
8-10 slide Powerpoint The example company is Tesla.Instructions.docx
8-10 slide Powerpoint The example company is Tesla.Instructions.docx8-10 slide Powerpoint The example company is Tesla.Instructions.docx
8-10 slide Powerpoint The example company is Tesla.Instructions.docxpriestmanmable
 
8Network Security April 2020FEATUREAre your IT staf.docx
8Network Security  April 2020FEATUREAre your IT staf.docx8Network Security  April 2020FEATUREAre your IT staf.docx
8Network Security April 2020FEATUREAre your IT staf.docxpriestmanmable
 

More from priestmanmable (20)

9©iStockphotoThinkstockPlanning for Material and Reso.docx
9©iStockphotoThinkstockPlanning for Material and Reso.docx9©iStockphotoThinkstockPlanning for Material and Reso.docx
9©iStockphotoThinkstockPlanning for Material and Reso.docx
 
a 12 page paper on how individuals of color would be a more dominant.docx
a 12 page paper on how individuals of color would be a more dominant.docxa 12 page paper on how individuals of color would be a more dominant.docx
a 12 page paper on how individuals of color would be a more dominant.docx
 
978-1-5386-6589-318$31.00 ©2018 IEEE COSO Framework for .docx
978-1-5386-6589-318$31.00 ©2018 IEEE COSO Framework for .docx978-1-5386-6589-318$31.00 ©2018 IEEE COSO Framework for .docx
978-1-5386-6589-318$31.00 ©2018 IEEE COSO Framework for .docx
 
92 Academic Journal Article Critique  Help with Journal Ar.docx
92 Academic Journal Article Critique  Help with Journal Ar.docx92 Academic Journal Article Critique  Help with Journal Ar.docx
92 Academic Journal Article Critique  Help with Journal Ar.docx
 
A ) Society perspective90 year old female, Mrs. Ruth, from h.docx
A ) Society perspective90 year old female, Mrs. Ruth, from h.docxA ) Society perspective90 year old female, Mrs. Ruth, from h.docx
A ) Society perspective90 year old female, Mrs. Ruth, from h.docx
 
9 dissuasion question Bartol, C. R., & Bartol, A. M. (2017)..docx
9 dissuasion question Bartol, C. R., & Bartol, A. M. (2017)..docx9 dissuasion question Bartol, C. R., & Bartol, A. M. (2017)..docx
9 dissuasion question Bartol, C. R., & Bartol, A. M. (2017)..docx
 
9 AssignmentAssignment Typologies of Sexual AssaultsT.docx
9 AssignmentAssignment Typologies of Sexual AssaultsT.docx9 AssignmentAssignment Typologies of Sexual AssaultsT.docx
9 AssignmentAssignment Typologies of Sexual AssaultsT.docx
 
9 0 0 0 09 7 8 0 1 3 4 4 7 7 4 0 4ISBN-13 978-0-13-44.docx
9 0 0 0 09 7 8 0 1 3 4 4 7 7 4 0 4ISBN-13 978-0-13-44.docx9 0 0 0 09 7 8 0 1 3 4 4 7 7 4 0 4ISBN-13 978-0-13-44.docx
9 0 0 0 09 7 8 0 1 3 4 4 7 7 4 0 4ISBN-13 978-0-13-44.docx
 
900 BritishJournalofNursing,2013,Vol22,No15©2.docx
900 BritishJournalofNursing,2013,Vol22,No15©2.docx900 BritishJournalofNursing,2013,Vol22,No15©2.docx
900 BritishJournalofNursing,2013,Vol22,No15©2.docx
 
9 Augustine Confessions (selections) Augustine of Hi.docx
9 Augustine Confessions (selections) Augustine of Hi.docx9 Augustine Confessions (selections) Augustine of Hi.docx
9 Augustine Confessions (selections) Augustine of Hi.docx
 
8.3 Intercultural CommunicationLearning Objectives1. Define in.docx
8.3 Intercultural CommunicationLearning Objectives1. Define in.docx8.3 Intercultural CommunicationLearning Objectives1. Define in.docx
8.3 Intercultural CommunicationLearning Objectives1. Define in.docx
 
8413 906 AMLife in a Toxic Country - NYTimes.comPage 1 .docx
8413 906 AMLife in a Toxic Country - NYTimes.comPage 1 .docx8413 906 AMLife in a Toxic Country - NYTimes.comPage 1 .docx
8413 906 AMLife in a Toxic Country - NYTimes.comPage 1 .docx
 
8. A 2 x 2 Experimental Design - Quality and Economy (x1 and x2.docx
8. A 2 x 2 Experimental Design - Quality and Economy (x1 and x2.docx8. A 2 x 2 Experimental Design - Quality and Economy (x1 and x2.docx
8. A 2 x 2 Experimental Design - Quality and Economy (x1 and x2.docx
 
800 Words 42-year-old man presents to ED with 2-day history .docx
800 Words 42-year-old man presents to ED with 2-day history .docx800 Words 42-year-old man presents to ED with 2-day history .docx
800 Words 42-year-old man presents to ED with 2-day history .docx
 
8.1 What Is Corporate StrategyLO 8-1Define corporate strategy.docx
8.1 What Is Corporate StrategyLO 8-1Define corporate strategy.docx8.1 What Is Corporate StrategyLO 8-1Define corporate strategy.docx
8.1 What Is Corporate StrategyLO 8-1Define corporate strategy.docx
 
8.0 RESEARCH METHODS These guidelines address postgr.docx
8.0  RESEARCH METHODS  These guidelines address postgr.docx8.0  RESEARCH METHODS  These guidelines address postgr.docx
8.0 RESEARCH METHODS These guidelines address postgr.docx
 
95People of AppalachianHeritageChapter 5KATHLEEN.docx
95People of AppalachianHeritageChapter 5KATHLEEN.docx95People of AppalachianHeritageChapter 5KATHLEEN.docx
95People of AppalachianHeritageChapter 5KATHLEEN.docx
 
9 781292 041452ISBN 978-1-29204-145-2Forensic Science.docx
9 781292 041452ISBN 978-1-29204-145-2Forensic Science.docx9 781292 041452ISBN 978-1-29204-145-2Forensic Science.docx
9 781292 041452ISBN 978-1-29204-145-2Forensic Science.docx
 
8-10 slide Powerpoint The example company is Tesla.Instructions.docx
8-10 slide Powerpoint The example company is Tesla.Instructions.docx8-10 slide Powerpoint The example company is Tesla.Instructions.docx
8-10 slide Powerpoint The example company is Tesla.Instructions.docx
 
8Network Security April 2020FEATUREAre your IT staf.docx
8Network Security  April 2020FEATUREAre your IT staf.docx8Network Security  April 2020FEATUREAre your IT staf.docx
8Network Security April 2020FEATUREAre your IT staf.docx
 

Recently uploaded

Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 

Recently uploaded (20)

Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 

ISYS 2394 Business Globalisation and Business IT.docx

  • 1. ISYS 2394 Business Globalisation and Business IT Security in a Global Environment Barry Cook * Index * Security in a Global Environment Introduction Introduction My Background Disclaimer Security in a Globalised Environment Impact of Data Breaches Largest Data Breaches of All Time Security Threat Basics Emerging IT Trends Security Considerations Defences and Best Practices Summary Security in a Global Environment
  • 2. * IntroductionThe objective of today is to: Provide you an overview of the current major security threats, risks and impacts to individuals and businesses, in our globalised world Provide you some high level best practices and defences to address security threats and risks Get you to starting to think about security as an integral part of your development plans Today Part 1: Lecture and Questions Part 2: Practical Activity with 3 Minute Presentation Per Group * Security in a Global Environment Security in a Global Environment * My BackgroundCurrent Role: J6, Defence Command Support Training Centre (DCSTC) J = Joint (Army, Navy, Air Force), 6 = Communication Information Systems (CIS)Experience National Security Focus Department of Defence & Federal Attorney-General’s Department Management / IT ConsultancyCurrent Research Interests Cyber-Security & Cyber-Warfare *
  • 3. Security in a Global Environment Security in a Global Environment * Disclaimer Everything you hear today is based on material available in the public domain. Nothing Specific, Unique or Classified to the Department of Defence, Australian Government or our Allies will be discussed or referenced. * Security in a Global Environment Security in a Global Environment * Security in a Globalised EnvironmentTechnology has opened up Global Opportunities and Markets It has also lead to a significant increase in the Security Threats to Individuals and Businesses Mobile Devices estimated to reach 10 Billion by 20161 Accumulated Digital Data to grow to 8 Zettabytes by 20152 Distributed nature of the threats, makes it difficult for Law Enforcement to address root causes. Threat often occur from multiple sovereignties each with differing laws and jurisdictional processes
  • 4. You can’t just block all the traffic, as it is often mixed in with legitimate traffic * Security in a Global Environment Source: 1. Cisco 2. IDC Worldwide Big Data Technology and Service 2012-2015 Forecast Security in a Global Environment * Impact of Data BreachesLoss of Customer Confidence and Loss of CustomersLoss of Competitive AdvantageFraudFinesCost of Data Breaches on Business1 $188 per record stolen in 2013 Cost of Identify Theft on Individuals2 Average Cost of $4,841 per person Average Time to Repair Damage caused by Identify Theft is 330 Hours * Security in a Global Environment Source: 1. 2013 Cost of Data Breach Study, Ponemon Institute 2. Identify Theft Resource Centre Average Total Organisation Cost of Data Breach for Large Business1 Security in a Global Environment
  • 5. * Largest Data Breaches of All Time * Security in a Global Environment Source: 1. Nathan Yau, http://flowingdata.com Security in a Global Environment * Index * Security in a Global Environment Introduction Security Threat Basics Emerging IT Trends Security Considerations Defences and Best Practices Summary Threat Motives Threat Actors Threat Vectors Technical Threats Non-Technical Threats Security in a Global Environment *
  • 6. Threats MotivesFinancial Gain Competitive Advantage Disruption Political Advantage / Hacktivism Disobedience / Protest Showing Off / “THE CHALLENGE” * Security in a Global Environment Security in a Global Environment * Threats ActorsOrganised Crime Financial Gain State Sponsored / Foreign Government Espionage, Disruption Terrorist Groups Financial Gain, Disruption Individuals Internal – Disgruntled Employee, Curious Insider, Ignorance Outsider – Hackers, “Script Kiddies”, Competitors * Security in a Global Environment Security in a Global Environment *
  • 7. Threats VectorsWeb – Fake SitesEmail – Attachments, LinksUnsecure Devices – Wireless Hotspots, Physical DevicesRemovable Media (USB Thumb Drives)Social MediaSocial Engineering * Security in a Global Environment Source: 1. Symantec Intelligence Report for Feb 2014 1 Security in a Global Environment * Technical Threats - PhishingPhishing Fake Website designed to look like real one to obtain privilege information Generic in Nature Email / Social Networking Attack VectorSpear Phishing Targets Individuals based on already known information about the target May appear to come from a trusted source * Security in a Global Environment Source: 1. Symantec Intelligence Report for Feb 2014 In Dec 2013, it was estimated 1 in every 1,053 emails was a Phishing attempt.1 Security in a Global Environment
  • 8. * Technical Threats - MalwareTrojansVirusesSpywareAdwareWormsScarewareBotnet sSoftware Keyloggers * Security in a Global Environment Source: 1. PandaLabs Annual Report 2013 Summary 2. Symantec Intelligence Report for Feb 2014 In Dec 13, it was estimated 1 in every 164 emails contained Malware2 1 Security in a Global Environment * Technical Threats - Hardware Keyloggers * Security in a Global Environment Security in a Global Environment *
  • 9. Technical Threats – Zero-Day AttacksZero-Day Attacks Attacks that exploits a security vulnerability on the day or even before it becomes generally known Type of Advanced Persistent Threat (APT) Famous Examples Attack on Google in 2009 as a result of a Internet Explorer Zero-Day Flaw. HEART BLEED OpenSSL Vulnerability * Security in a Global Environment Source: 1. Symantec Elderwood Project 1 Security in a Global Environment * Technical Threats - Heartbleed Bug * Security in a Global Environment Source: 1. LWG Consulting 1 Security in a Global Environment *
  • 10. Non Technical Threats – PasswordsPoor Passwords Lack Length and Complexity Hard to Remember so written down Password Lengths Any Password < 5 Characters can be cracked in 5 seconds Any Password < 7 Characters can be cracked within 1 day Even 8 Character Passwords with some complexity can be cracked in a few months * Security in a Global Environment Security in a Global Environment * Non Technical Threats – OtherPhysical Security Lack of Protection of Sensitive and Critical ICT Assets Includes End User Device Protection when MobileImproper Destruction Paper and Electronic AssetsInsufficient Backup and Recovery Risk to Data Survivability and IntegrityInadequate Staff Identification Processes Susceptibility to Social Engineering Attack Vector * Security in a Global Environment Security in a Global Environment *
  • 11. Index * Security in a Global Environment Introduction Security Threat Basics Emerging IT Trends Security Considerations Defences and Best Practices Summary Cloud Computing BYOD Mobile Devices Big Data Security in a Global Environment * Cloud ComputingWhat about my Data Where is My Data stored? Who has access to My Data?Data Segregation How well is my Data Segregated from others Cloud Clients?Recovery What are my Recovery Options?Compliance Requirements Can I guarantee they are achieved if I don’t control the infrastructure? * Security in a Global Environment Security in a Global Environment
  • 12. * Bring Your Own Device (BYOD)All Devices or Only Some? What about Patching and Updates? How will you deploy applications to all the devices?Data Ownership What happens when the employee leaves?Device Loss or Theft How do you maintain control? What about User Rights? * Security in a Global Environment Security in a Global Environment * Mobile DevicesMobile Devices are just as susceptible to threats Malware Bluesnarfing Phone Hacking Browser Security Issues * Security in a Global Environment Source: 1. F-secure Mobile Threat Report Q1 2014 Mobile Device Malware Detected Q1 20141 Security in a Global Environment
  • 13. * Index * Security in a Global Environment Introduction Security Basics Emerging IT Trends Security Considerations Defences and Best Practices Summary Defence in Depth CycleLayered DefenceSecurity MeasuresTop 4 Mitigation StrategiesMobile / BYOD Security Control FrameworkCloud Computer Security Security in a Global Environment * Defence in Depth CycleContext Business Strategy in PlayRisk Analysis Identify Generic and Specific Risks to Business and its consequencesImplement Defence in Depth Employ a Multi-Layer Defence StrategyReview and Monitor Ensure Defence Strategy is continuous reviewed and updated * Security in a Global Environment AS43560 Risk Rating Levels Source: 1. Trusted Information Sharing Network www.tisn.gov.au Security in a Global Environment
  • 14. * Layered Defence * Security in a Global Environment Source: 1. Trusted Information Sharing Network www.tisn.gov.au Security in a Global Environment * Security Measures – Physical SecuritySecure Server Rooms Restrict Access to only those that require and log/monitor access at all times Keep Server Rooms neat and documented, so anomalies can be quickly detectedRestrict Entry to Work Areas to only authorised personnelSecure Mobile Assets In and Out of the OfficeControl Physical Assets that contain data and information at all times From Creation to Destruction * Security in a Global Environment Security in a Global Environment *
  • 15. Security Measures – Device SecurityPatch Operating System and Applications consistently and quickly. Setup an Automatic Mechanism to updateInstall Suitable Security Software Should include Anti-virus, Firewall, Anti-Spam, Anti-Malware, Web Site Threat Checker Needs to check for updates multiple times per dayEncrypt Data on Portable DevicesRestrict Application Installation/Usage to Only Authorised ApplicationsDisable Auto Run / Auto Load of Removal Media * Security in a Global Environment Security in a Global Environment * Security Measures – Network/System SecurityApply Multiple Levels of Network Defence Firewalls / Routers / Gateways Intrusion Detection SystemsMonitor Network Continuously and Quickly Act to Protect Know what devices are on your network at all times and what they are doingApply comprehensive Access Controls to Data Consider Multi-Factor Authentication such as Tokens, Smart Cards or Biometrics Remove Access immediately upon personnel change (Staff Departure, Role Change)Implement Robust Change Management and Application Development SDLC Processes *
  • 16. Security in a Global Environment Security in a Global Environment * Security Measures – User SecuritySecurity Awareness Training Threat and Consequence Awareness Training Anti-Phishing and Anti-Social Engineering Training What to do if a “Breach” occursSuitable Password At least 10 Characters with mixture of Upper & Lower Case, Numbers and Special Characters. However, the longer the password length the less complex it has to be. Use different passwords for different types of systems. E.g. Social Media, Banking Change Passwords Regularly Don’t Share Passwords * Security in a Global Environment Security in a Global Environment * Top 4 Mitigation Strategies * Security in a Global Environment Source: 1. DSD Top 35 Strategies to Mitigate Targeted Cyber Intrusions
  • 17. 1Mitigation Strategy Effectiveness RankingMitigation StrategyDesigned to Prevent or Detect an IntrusionUser ResistanceUpfront CostMaintenance Cost1Patch applications e.g. PDF viewer, Flash Player, Microsoft Office and Java. Patch or mitigate within two days for high risk vulnerabilities. Use the latest version of applications.PreventLowHighHigh2Patch operating system vulnerabilities. Patch or mitigate within two days for high risk vulnerabilities. Use the latest operating system version.PreventLowMediumMedium3Minimise the number of users with domain or local administrative privileges. Such users should use a separate unprivileged account for email and web browsing.PreventMediumMediumLow4Application whitelisting to help prevent malicious software and other unapproved programs from running e.g. by using Microsoft Software Restriction Policies or AppLocker.BothMediumHighMedium Security in a Global Environment *
  • 18. Mobile / BYOD Security Control Framework * Security in a Global Environment Source: 1. Trusted Information Sharing Network www.tisn.gov.au 1Security ControlsPreventiveDetectiveCorrectiveAccess ControlEnforce strong passwords Use two-factor authenticationExtend existing auditing and monitoring controls around mobile device connectionsConduct regular reviews of devices connecting to corporate networkData ProtectionEncrypt business data Limit the sensitive data transferred to mobile devices, or implement least privilege access Implement remote device management Enable device-lockout function when the device is not in usePerform technical security assessments on mobile devices and supporting infrastructure with emphasis on data stored on devices Monitor access and usage of high-risk data to identify potentially inappropriate usageImplement appropriate measures to eliminate or reduce the risk impact - either by enhancements in technology or by updating the policies/proceduresApplication SecurityAllow only certified business applicationsRegularly monitor installed applications to identify risks to corporate dataRemove applications identified to be untrustworthy or maliciousFundamental ControlsInstall anti malware software Install and manage personal firewall to permit only authorised trafficRegularly monitor compliance reports Setup alerts to identify changesEradicate and/or repair any devices identified to be non-complaint from company defined policyGovernance and ComplianceInclude mobile security into the organisations risk management program Add mobile security awareness to existing employee awareness programs Implement mobile device policies and include them in them in
  • 19. the Acceptable Use PoliciesAdd mobile devices in the organisations audit program Monitor and maintain logs of mobile device interactions with corporate network Address and mitigate any non-compliance Incorporate mobile devices into incident response plan Regularly review mobile device acquisition and usage Security in a Global Environment * Cloud Computing SecurityFully Understand the Cloud Providers Environment Service Levels Where you Data will be stored. Access rights to Government under local laws where that data will be stored Data Transfer Options should you want to move to another provider Data Retention PeriodsEncrypt your Data Particularly for Sensitive Data
  • 20. Should be Independent of Current Cloud Provider * Security in a Global Environment Security in a Global Environment * Index * Security in a Global Environment Introduction Security Basics Emerging IT Trends Security Considerations Defences and Best Practices Summary Key Points Additional Resources Security in a Global Environment * Key PointsUnderstand the Threats and Consequences General threats and those specific to your businessFactor Security into your Development Plans Engage with your Security ExpertsPatch your Operating Systems and Applications regularlyDeploy and Maintain Security Software on your DevicesSecure your Physical and
  • 21. Information AssetsRegularly conduct Security Awareness Training * Security in a Global Environment Security in a Global Environment * * Security in a Global Environment Security in a Global Environment * Additional Reading / SupportAustralian Signals Directorate http://www.asd.gov.au/publications/index.htmTrusted Information Sharing Network http://www.tisn.gov.au/Pages/default.aspxUS-CERT http://www.us-cert.govSymantec Intelligence Report http://www.symantec.com/theme.jsp?themeid=state_of_spamSA NS Security http://www.sans.org/reading_room/whitepapers/bestprachttp://w ww.sans.org/tip_of_the_day.phpAnti-Phishing Working Group http://www.antiphishing.org/ * Security in a Global Environment Security in a Global Environment
  • 22. * Globalization and Business IT Week One Dr Claire Davison AgendaGetting to know your classmatesIn-depth discussion of the assessment tasksgroup formation for assignmentReferencingTurnItIn Where do you live?NorthSouthEastWestCBD Course Co-ordinatorDr Paul R Cerroti [email protected] Course guide Assignment OneYour first assignment is a reflective writing exercise about a specific topic pertaining to Global business and IT. Specifically, you are required to reflect on the sessions two, three and four of this course:Globalisation and Business
  • 23. ITSocial MediaThe Role of IT in Global Business Assignment OneDue: Week 5Tuesday 19 August 2014 in class ORFriday 22 August 2014 in classMarks allocated: 10% of final mark Reflective Journal Writing Prepared by Lila Kemlo Manager Student Learning Support What is Reflective Practiceprocess of thinking about experiences, often new, with a view to learning from them a form of personal response to experiences, situations, events or information by reflecting on their meaning. This process enables you to better understand what you have learned and to gain new insights about yourself, others, and situations. These new insights may result in a change of behaviour, perspective or new action. There is neither a right nor a wrong way of reflective thinking, there are just questions to explore. What is the purpose of reflective journal writing To record the development of your ideas and insights, concepts, experiencesTo reflect on these thoughts and experiences as a means of increasing your understanding of both yourself and what you are observing To analyse what you learn and your self development – may lead to change
  • 24. What are the benefits of reflective practice?Life skill – by documenting experiences, thoughts, questions, ideas – develop an approach to thinking and learning - able to be transferred to all aspects of life observe, analyse & reflect your responses to situations opportunity to challenge ourselves, what we do and to explore ways to do it differently and better understand course material & gain skills related to your disciplinerecognise the acquired knowledge & skills developedenhance your employability as these skills are invaluable and attractive in the workplace and to potential employers. Reflective writing is NOTjust conveying information, instruction or argument pure description, though there may be descriptive elements straightforward decision or judgement (e.g. about whether something is right or wrong, good or bad) simple problem-solving a summary of course notes a standard university essay * The Learning Cycle Source: Adapted from Kolb’s Learning Cycle 1984 by the Study and Learning Centre 2002 Record (what)
  • 25. . Reflect (think) Analyse (explain & gain insight) New action Simplified Learning Cycle Step 1 in Learning Cycle: Record whatSummaries of the main points from the guest speakers’ presentationsImmediate thoughts/responses to what you are hearing from the speakersDescribe the experience you are having while listening to the speaker Step 2 in Learning Cycle: Reflect (think)Which speakers had the greatest impact on me? Why?What were the areas from their presentations that influenced my thinking? In Business?
  • 26. On self?How did I relate what the speakers said compared to what I believed/thought prior to the presentation (Relevance to me...beliefs, values, attitudes, assumptions)Did the speakers demonstrate any common characteristics/themes? What were they?How did what I heard link in with what I am studyingWhere there any surprises/challenges for me? What were they? Step 3 in Learning Cycle: AnalysisAnalysis in a reflective journal may involve three things: - Analysis of experience or content - Integration of experience with theory - Demonstration of improved awareness and self- development Step 3 in Learning Cycle: AnalysisWhat questions you have since that experience?What can I use and apply from this experience in my business practice/ management/life?What I have learned about myself?What have I learned about the ways in which I interact with others?What aspects of myself could I change/ develop as a result of what I have learned?Conclusions you have drawn. Step 4 in Learning Cycle: New ActionComparisons and connections between your prior assumptions, preconceptions and prior knowledge your new knowledge and experience How new ideas challenge what you already know What will I change about.....How will I go about changing......How will I monitor/evaluate the effectiveness of these changes?
  • 27. Style of writingMostly subjective. In addition to being reflective and logical, you can be personal, hypothetical, critical and creative. Write in the first person.includes description (what, when, who) and analysis (how, why, what if)…. often resulting in more questions than answers. A reflective task may allow you to use different modes of writing and language: descriptive (outlining what something is or how something was done) explanatory (explaining why or how it is like that) expressive (I think, I feel, I believe) questioningKeep colloquial language to a minimum (eg, ‘kid’, ‘bloke’, ‘stuff’). * reflective writing is mostly subjective. Therefore in addition to being reflective and logical, you can be personal, hypothetical, critical and creative. You can comment based on your experience, rather than limiting yourself to academic evidence. Reflective writing is an activity that includes description (what, when, who) and analysis (how, why, what if). It is an explorative tool often resulting in more questions than answers. A reflective task may allow you to use different modes of writing and language: descriptive (outlining what something is or how something was done) explanatory (explaining why or how it is like that) expressive (I think, I feel, I believe) Use full sentences and complete paragraphs You can usually use personal pronouns like 'I', 'my' or 'we' Keep colloquial language to a minimum (eg, kid, bloke, stuff) REFLECTIVE WRITINGDEIP handoutUsing the four steps of reflection:Who is someone you admire and what does it mean to
  • 28. you? BRW Research Report (Individual or Group) Students will select an organization of their choice and conduct one or two site visits, interview the relevant person(s) and write a magazine article regarding the organization as a whole or a department of the organization.This article should be written with the intention that it will be published in BUSINESS REVIEW WEEKLY. Assignment TwoDue date: Tuesday 23 September or Friday 26 September (submit in the class you are enrolled in)Worth: 40%Length: 4000 wordsGroup: No more than 2 people or individual Choosing an organisationIn choosing an organization students should carefully consider the need to address the specific requirements of the assessment. The choice of organization is very important. If in doubt please contact the lecturer.In your choice, also consider an organization, which is of manageable size and complexity for the project.When approaching an organization, it is essential that you make it clear that the project is for educational purposes only, and forms part of your assessment ISYS 2394 Globalization and Business IT Choosing an organisationName some organisations?What networks do you have?Who do I contact in an
  • 29. organisation?Look on the websiteMedia relations or PR departmentHuman resources department 1001 facets of business …Where to begin?Lecture topicsWhat interests you?Read magazines and newspapers to see what the current topics are …What are some current business trends?Your topic can be about the business or the person (a profile). Some good assignments have been about the personal experiences of successful business people Business Review Weeklyhttp://www.brw.com.au/Some articles are focused on:3 myths about your millenial staff, busted.Avocado smoothie, anyone? How Boost Juice and Sumo Salad have expanded offshoreIf physical retail is dying, someone forgot to tell Dick Smith CEO Nick Abboud Other sources Fast CompanyWiredInc.Forbes 1001 facets of businessSome topics we have had in the past:Cross cultural management in International hotelCareer path of celebrity chefChinese female entrepreneurAccommodation entrepreneursOarsome Foursome (Olympic rowers)Lord Mayor of Melbourne John SoEntrepreneur story - Paul RubensSystem implementation at SAP
  • 30. * How to get started on the report?Brainstorm ideasInvestigate networkRead, read, readTalk to peopleYou will need to collectSecondary data (Background information)Primary data (via interviews/surveys) * Some advantages of qualitative methodsUnderstanding/explaining personal experiences of individualsFocus on subjects' own understanding and interpretations Researcher experiences issues from a participant's perspectiveReports presented in a narrative rather than a statistical form – more interesting/understandable for non-experts Useful in examining personal changes over timeFocus on human-interest issues that are meaningful to managers * Some qualitative methodsIn-depth interviewsSmall number of subjects Checklist rather than a formal questionnaireTape- recording + verbatim transcript30 minutes to several hours; repeat interviews possible. Group interviews/focus groupsConducted with a groupInteraction between subjects + interaction between interviewer and subject. Collecting your informationRead about the topic and
  • 31. organisation before you go to the interview. Be prepared.You will need to organise an interview with the relevant person/people in the organisation you have chosen. A well planned 30 minute interview should use about eight to ten questions, any more and you’re not allowing the subject enough time to elaborate. To create a 4000 word paper you’ll probably need one hour (around 15 questions). You may need to be flexible with time and content * Wording of questionsavoid jargonsimplify wherever possibleavoid ambiguityavoid leading questionsask only one question at a time (avoid multi-purpose questions) * Asking your questionsStart with easy questionsStart with 'relevant' questionsLeave sensitive questions until later Be aware of reader/user – interviewer or respondent?Compactness (eg. single page) = ease of handling * How to write an article Create an outline for your article Your article should include a headline, introduction, body, conclusion and resource box
  • 32. Headline - make this as catchy as possible because your reader will read this first and decide if they will continue reading the rest of the article. i.e. "7 Highly Effective Ways to Gain Instant Traffic to Your Web Site". Introduction - introduce the topic you will be discussing in your article or write a short story of your experience with the topic/issue. * Planning and Drafting – What not to doDon’t just summarize sourcesDon’t string quotes together and hope that it tells the story.Instead, add your analysis and thoughts surrounding that quote.Don’t write in the form of “The first issue was … and this was followed by …” (step-by-step narrative)Instead, focus on the results and analysis of your research. This is the juicy information and could be the story of your analysis/results.Don’t plagiarize – use direct quotes or paraphrase. How to write an article Body - discuss all the aspects of the topic that you outlined in the introduction. Break up each point into separate paragraphs and keep them to about 5 - 8 lines. You may want to create a sub-heading for each point. This makes it easier to read as most people will scan your article. Show, not tell – this is the golden rule of all writers
  • 33. How to write an article Conclusion - this should include a brief summary of your article and a call for the reader to take action. i.e. "Be sure to include article marketing as one of the top strategies for promoting your web site. It's a self generating marketing machine that produces a constant flow of visitors". Resource box - this is the place you can add extra information about your topic that is not strictly linked to the article. Eg background information about a topic Write with style - write in an informal style, like you would explain your topic to a friend but formal enough that it is not written in the first person. How to write an article When you finish writing, put it aside for some time. Let your mind cool off a little, and then try to take an independent look at what you have written. If you can’t, ask your family member/friend/anyone whose opinion you value to read your article and give feedback. Format of reportMust be formatted in the same way as a magazine article The use of graphs, visuals and photographs are essential to your piece of work.Content, layout, neatness,
  • 34. originality of presentation are important to the overall final product. ReferencingHarvard style of referencing.Use online resourcesEndnote TurnItIn – http://www.turnitin.com What are you interested in?Social MediaGlobal supply chain and logisticsBusiness in ChinaOnline securityCross cultural understanding in businessGlobalizationEthical issues in business