SlideShare a Scribd company logo
Introduction
Seminar 1
Internet: secure place for Business ?
Josep Bardallo - 2012
INTERNET
2
/ 10
/ 2012
JOSEP BARDALLO
The most challenging tool in the managing arena ……
Main channel for communication, distribution or knowledge
networking ……
A “new” Business place for companies …………..
BUT …………..
COMPANIES HACKED: DATA BREACH & SERVICES DOWN …
2
/ 10
/ 2012
JOSEP BARDALLO
COMPANIES HACKED: DATA BREACH & SERVICES DOWN …
2
/ 10
/ 2012
JOSEP BARDALLO
HACKING IS TODAY A BUSINESS …..
2
/ 10
/ 2012
JOSEP BARDALLO
• “Expensive cars choke the streets of Râmnicu
Vâlcea’s bustling center. Top-of-the-line BMWs,
Audis, and Mercedes driven by twenty- and
thirty-something men sporting gold chains.
• I ask my cab driver if these men all have high-
paying jobs. He laughs, then wiggles his fingers
as if typing on a keyboard…
• “They steal money on the Internet.”
AND A WEAPON …..
2
/ 10
/ 2012
JOSEP BARDALLO
http://socks-studio.com/2012/07/17/stuxnet-anatomy-of-the-first-weapon-made-entirely-out-of-code/
EVEN AGAINST THE MOST PREPARED TODAY ….
2
/ 10
/ 2012
JOSEP BARDALLO
AND ALL KIND OF DAILY USE THINGS ….
2
/ 10
/ 2012
JOSEP BARDALLO
http://www.euronews.com/2012/09/25/hacking-into-a-car
SO ………..
2
/ 10
/ 2012
JOSEP BARDALLO
Internet is a good place for business
But you need include security in the Business plan
Security is a balance between Risk and Budget
CLASS DISCUSSION AND REPORT
2
/ 10
/ 2012
JOSEP BARDALLO
Work in teams, and choose a question:
 Which sector can be more affected by Internet issues ?
 Are SMB affected by security issues in Internet business ?
 http://www.tekconn.com/news/it-support/smbs-dont-have-to-be-targeted-to-be-hacked/
5’ speak conclusions each team (to entire class), and open discussion
Report for the next day
BIBLIOGRAPHY
2
/ 10
/ 2012
JOSEP BARDALLO
http://www.forbes.com/sites/andygreenberg/2011/04/04/anonymous-hackers-bring-down-sony-websites/
http://www.wired.com/gamelife/2011/05/sony-online-entertainment-hack
http://articles.cnn.com/2012-07-12/tech/tech_web_yahoo-users-hacked_1_passwords-yahoo-accounts-hack
http://openspace.org.in/UIDaadhaarsecurity2012
http://www.wired.com/magazine/2011/01/ff_hackerville_romania/
http://socks-studio.com/2012/07/17/stuxnet-anatomy-of-the-first-weapon-made-entirely-out-of-code/
http://www.youtube.com/watch?v=uZUaZjZAy1s
http://www.huffingtonpost.com/2012/10/01/white-house-hacked-cyber-_n_1928646.html
http://www.foxnews.com/tech/2012/10/01/washington-confirms-chinese-hack-attack-on-white-house-computer/
http://www.senderbase.org/home/detail_spam_volume
http://www.theatlantic.com/technology/archive/2012/08/all-the-spammers-in-the-world-may-only-make-200-million-a-
year/260814/
http://www.computerworld.com/s/article/9229919/Car_hacking_Remote_access_and_other_security_issues
http://www.euronews.com/2012/09/25/hacking-into-a-car/
http://www.tekconn.com/news/it-support/smbs-dont-have-to-be-targeted-to-be-hacked/

More Related Content

Viewers also liked

Diapositivas choricasanare
Diapositivas choricasanareDiapositivas choricasanare
Diapositivas choricasanare
marily2014
 
Unidad de servicios de apoyo a la educación
Unidad de servicios de apoyo a la educaciónUnidad de servicios de apoyo a la educación
Unidad de servicios de apoyo a la educación
Jair De la Cruz
 
Power point tics
Power point ticsPower point tics
Power point tics
Carla Escobar
 
AsmisN-WS3A3.3CompleteSlides[1]
AsmisN-WS3A3.3CompleteSlides[1]AsmisN-WS3A3.3CompleteSlides[1]
AsmisN-WS3A3.3CompleteSlides[1]Nestor Asmis
 
PERTUMBUHAN,PERKEMBANGAN,PERKECAMBAHAN
PERTUMBUHAN,PERKEMBANGAN,PERKECAMBAHANPERTUMBUHAN,PERKEMBANGAN,PERKECAMBAHAN
PERTUMBUHAN,PERKEMBANGAN,PERKECAMBAHAN
Muhammad Haj
 

Viewers also liked (11)

Diapositivas choricasanare
Diapositivas choricasanareDiapositivas choricasanare
Diapositivas choricasanare
 
17 nov
17 nov17 nov
17 nov
 
Entrada
EntradaEntrada
Entrada
 
11nov
11nov11nov
11nov
 
Unidad de servicios de apoyo a la educación
Unidad de servicios de apoyo a la educaciónUnidad de servicios de apoyo a la educación
Unidad de servicios de apoyo a la educación
 
32150
3215032150
32150
 
Power point tics
Power point ticsPower point tics
Power point tics
 
Eduate others
Eduate othersEduate others
Eduate others
 
AsmisN-WS3A3.3CompleteSlides[1]
AsmisN-WS3A3.3CompleteSlides[1]AsmisN-WS3A3.3CompleteSlides[1]
AsmisN-WS3A3.3CompleteSlides[1]
 
PERTUMBUHAN,PERKEMBANGAN,PERKECAMBAHAN
PERTUMBUHAN,PERKEMBANGAN,PERKECAMBAHANPERTUMBUHAN,PERKEMBANGAN,PERKECAMBAHAN
PERTUMBUHAN,PERKEMBANGAN,PERKECAMBAHAN
 
18nnov
18nnov18nnov
18nnov
 

More from Josep Bardallo

DNIe como acceso universal en entornos multiplataforma
DNIe como acceso universal en entornos multiplataformaDNIe como acceso universal en entornos multiplataforma
DNIe como acceso universal en entornos multiplataforma
Josep Bardallo
 
Svt cloud security services - Catalogo de Servicios
Svt cloud security services - Catalogo de ServiciosSvt cloud security services - Catalogo de Servicios
Svt cloud security services - Catalogo de Servicios
Josep Bardallo
 
M10 service management
M10 service managementM10 service management
M10 service managementJosep Bardallo
 
M9 cloud & open source
M9 cloud & open sourceM9 cloud & open source
M9 cloud & open sourceJosep Bardallo
 
M8 privacy & regulatory in internet
M8 privacy & regulatory in internetM8 privacy & regulatory in internet
M8 privacy & regulatory in internetJosep Bardallo
 
M7 internet security
M7 internet securityM7 internet security
M7 internet security
Josep Bardallo
 
M4 internet systems & applications I
M4   internet systems & applications IM4   internet systems & applications I
M4 internet systems & applications IJosep Bardallo
 
M5 internet systems & applications ii
M5 internet systems & applications iiM5 internet systems & applications ii
M5 internet systems & applications iiJosep Bardallo
 
M1 network types & internet
M1   network types & internetM1   network types & internet
M1 network types & internetJosep Bardallo
 
S4 public or private datacenter
S4 public or private datacenterS4 public or private datacenter
S4 public or private datacenterJosep Bardallo
 
S3 internet business with user data
S3   internet business with user dataS3   internet business with user data
S3 internet business with user dataJosep Bardallo
 
Securima ti ca 2013 - seguridad en la nube
Securima ti ca 2013 - seguridad en la nubeSecurima ti ca 2013 - seguridad en la nube
Securima ti ca 2013 - seguridad en la nubeJosep Bardallo
 
SVT CloudJacket Service
SVT CloudJacket ServiceSVT CloudJacket Service
SVT CloudJacket ServiceJosep Bardallo
 
SVT. innovacion y crecimiento con Cloud 2013
SVT. innovacion y crecimiento con Cloud 2013SVT. innovacion y crecimiento con Cloud 2013
SVT. innovacion y crecimiento con Cloud 2013Josep Bardallo
 
Ahorro De Costes Con Esso. Best Practices
Ahorro De Costes Con Esso. Best PracticesAhorro De Costes Con Esso. Best Practices
Ahorro De Costes Con Esso. Best Practices
Josep Bardallo
 
SSO ROI
SSO ROISSO ROI
ITIL v3 Problem Management
ITIL v3 Problem ManagementITIL v3 Problem Management
ITIL v3 Problem Management
Josep Bardallo
 

More from Josep Bardallo (20)

DNIe como acceso universal en entornos multiplataforma
DNIe como acceso universal en entornos multiplataformaDNIe como acceso universal en entornos multiplataforma
DNIe como acceso universal en entornos multiplataforma
 
Svt cloud security services - Catalogo de Servicios
Svt cloud security services - Catalogo de ServiciosSvt cloud security services - Catalogo de Servicios
Svt cloud security services - Catalogo de Servicios
 
M10 service management
M10 service managementM10 service management
M10 service management
 
M9 cloud & open source
M9 cloud & open sourceM9 cloud & open source
M9 cloud & open source
 
M8 privacy & regulatory in internet
M8 privacy & regulatory in internetM8 privacy & regulatory in internet
M8 privacy & regulatory in internet
 
M7 internet security
M7 internet securityM7 internet security
M7 internet security
 
M6 cloud computing
M6 cloud computingM6 cloud computing
M6 cloud computing
 
M4 internet systems & applications I
M4   internet systems & applications IM4   internet systems & applications I
M4 internet systems & applications I
 
M5 internet systems & applications ii
M5 internet systems & applications iiM5 internet systems & applications ii
M5 internet systems & applications ii
 
M1 network types & internet
M1   network types & internetM1   network types & internet
M1 network types & internet
 
S6 cloud hype cycle
S6 cloud hype cycleS6 cloud hype cycle
S6 cloud hype cycle
 
S5 email dying
S5 email dyingS5 email dying
S5 email dying
 
S4 public or private datacenter
S4 public or private datacenterS4 public or private datacenter
S4 public or private datacenter
 
S3 internet business with user data
S3   internet business with user dataS3   internet business with user data
S3 internet business with user data
 
Securima ti ca 2013 - seguridad en la nube
Securima ti ca 2013 - seguridad en la nubeSecurima ti ca 2013 - seguridad en la nube
Securima ti ca 2013 - seguridad en la nube
 
SVT CloudJacket Service
SVT CloudJacket ServiceSVT CloudJacket Service
SVT CloudJacket Service
 
SVT. innovacion y crecimiento con Cloud 2013
SVT. innovacion y crecimiento con Cloud 2013SVT. innovacion y crecimiento con Cloud 2013
SVT. innovacion y crecimiento con Cloud 2013
 
Ahorro De Costes Con Esso. Best Practices
Ahorro De Costes Con Esso. Best PracticesAhorro De Costes Con Esso. Best Practices
Ahorro De Costes Con Esso. Best Practices
 
SSO ROI
SSO ROISSO ROI
SSO ROI
 
ITIL v3 Problem Management
ITIL v3 Problem ManagementITIL v3 Problem Management
ITIL v3 Problem Management
 

Recently uploaded

Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 

Recently uploaded (20)

Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 

S1 internet, secure place for business

  • 1. Introduction Seminar 1 Internet: secure place for Business ? Josep Bardallo - 2012
  • 2. INTERNET 2 / 10 / 2012 JOSEP BARDALLO The most challenging tool in the managing arena …… Main channel for communication, distribution or knowledge networking …… A “new” Business place for companies ………….. BUT …………..
  • 3. COMPANIES HACKED: DATA BREACH & SERVICES DOWN … 2 / 10 / 2012 JOSEP BARDALLO
  • 4. COMPANIES HACKED: DATA BREACH & SERVICES DOWN … 2 / 10 / 2012 JOSEP BARDALLO
  • 5. HACKING IS TODAY A BUSINESS ….. 2 / 10 / 2012 JOSEP BARDALLO • “Expensive cars choke the streets of Râmnicu Vâlcea’s bustling center. Top-of-the-line BMWs, Audis, and Mercedes driven by twenty- and thirty-something men sporting gold chains. • I ask my cab driver if these men all have high- paying jobs. He laughs, then wiggles his fingers as if typing on a keyboard… • “They steal money on the Internet.”
  • 6. AND A WEAPON ….. 2 / 10 / 2012 JOSEP BARDALLO http://socks-studio.com/2012/07/17/stuxnet-anatomy-of-the-first-weapon-made-entirely-out-of-code/
  • 7. EVEN AGAINST THE MOST PREPARED TODAY …. 2 / 10 / 2012 JOSEP BARDALLO
  • 8. AND ALL KIND OF DAILY USE THINGS …. 2 / 10 / 2012 JOSEP BARDALLO http://www.euronews.com/2012/09/25/hacking-into-a-car
  • 9. SO ……….. 2 / 10 / 2012 JOSEP BARDALLO Internet is a good place for business But you need include security in the Business plan Security is a balance between Risk and Budget
  • 10. CLASS DISCUSSION AND REPORT 2 / 10 / 2012 JOSEP BARDALLO Work in teams, and choose a question:  Which sector can be more affected by Internet issues ?  Are SMB affected by security issues in Internet business ?  http://www.tekconn.com/news/it-support/smbs-dont-have-to-be-targeted-to-be-hacked/ 5’ speak conclusions each team (to entire class), and open discussion Report for the next day
  • 11. BIBLIOGRAPHY 2 / 10 / 2012 JOSEP BARDALLO http://www.forbes.com/sites/andygreenberg/2011/04/04/anonymous-hackers-bring-down-sony-websites/ http://www.wired.com/gamelife/2011/05/sony-online-entertainment-hack http://articles.cnn.com/2012-07-12/tech/tech_web_yahoo-users-hacked_1_passwords-yahoo-accounts-hack http://openspace.org.in/UIDaadhaarsecurity2012 http://www.wired.com/magazine/2011/01/ff_hackerville_romania/ http://socks-studio.com/2012/07/17/stuxnet-anatomy-of-the-first-weapon-made-entirely-out-of-code/ http://www.youtube.com/watch?v=uZUaZjZAy1s http://www.huffingtonpost.com/2012/10/01/white-house-hacked-cyber-_n_1928646.html http://www.foxnews.com/tech/2012/10/01/washington-confirms-chinese-hack-attack-on-white-house-computer/ http://www.senderbase.org/home/detail_spam_volume http://www.theatlantic.com/technology/archive/2012/08/all-the-spammers-in-the-world-may-only-make-200-million-a- year/260814/ http://www.computerworld.com/s/article/9229919/Car_hacking_Remote_access_and_other_security_issues http://www.euronews.com/2012/09/25/hacking-into-a-car/ http://www.tekconn.com/news/it-support/smbs-dont-have-to-be-targeted-to-be-hacked/