SlideShare ist ein Scribd-Unternehmen logo
1 von 32
ITC 241
Introduction to Internet Security
Computer Security Defined by
NIST - National Institute of Standards and Technology
http://csrc.nist.gov/
“The protection afforded to an automated
information system in order to attain the applicable
objectives of preserving the integrity, availability,
and confidentiality of information system resources
(includes hardware, software, firmware,
information/data, and telecommunications).”
●Confidentiality –
information access and
disclosure
●Integrity – modification
or destruction of
information
●Availability – timely,
reliable access
Impact Considerations
● Performance
● Organizational assets
● Financial loss
● Harm to Individuals
http://www.youtube.com/watch?v=d-d5TDHa8jw
Confidentiality
● Personal privacy
● Proprietary information
● Secret Info should remain secret
The unauthorized disclosure
(access) of information
Confidentiality
● Mechanisms of
Protection
● Cryptography
● Access Controls
● Examples of Threats
● Malware
● Intruders
● Social engineering
● Insecure networks
● Poorly administered
systems
How does Anonymous do this?
What's the Impact Level of the following real world cases?
http://www.cnn.com/2013/08/21/us/bradley-manning-sentencing
http://www.cnn.com/2013/08/21/us/bradley-manning-sentencing
http://www.forbes.com/sites/ruchikatulshyan/2013/08/23/is-your-spouse-your-biggest-online-security-risk/
http://www.databreaches.net/university-of-north-carolina-servers-hacked-3500-employees-data-accessed/
Integrity
● Trustworthiness
● Origin
● Completeness
● Correctness
unauthorized modification or
destruction of information
Integrity
● Protective
Mechanism
● Access controls to
prevent modification
● Detective
Mechanisms
● identify when
modifications occur
when protective
mechanisms fail
● Integrity Controls
● Principles of least
privilege
● Separation
● Rotation of duties
http://www.cultofmac.com/183063/apple-responds-to-journalist-victim-of-icloud-hack/
This all happened because the hackers were
able to get a hold of Honan’s email address,
his billing address and the last four digits of a
credit card he has on file. Once the hacker
had this info, he or she called Apple, asked
for a reset to the iCloud account in Honan’s
name, and was given a temporary password.
Availability – disruption of access
to or use of information or an
information system.
Confidentiality and Integrity matter
not if the system is not available!
Availability
Threats
● Attacks against
Availability = DoS
● Natural Disasters
● Manmade Disasters
Protective
Mechanisms
● Business continuity
● Disaster Recovery
Planning
● regular/reliable
backups to minimize
loss
How does Anonymous do this?
Identification – scope, locality,
uniqueness of IDs
Authentication – prove to be the
person you say you claim to be!
Identify-authenticate-authorize
login – password – permissions
Methods of Authentication
● What you know (low strength)
● Passwords, passphrases, secret codes,
PINs (low cost)
● What you have (low strength)
● Keys, smart cards, tokens
● (in possession of = higher cost)
● What you are (potential high strength)
● Biometrics
Authorization
● Role Privileges, Rights, Permissions
● Guest
● Participant
● Admin
permissions to view, insert, delete, modify, admin
How does anybody do this?
http://live.wsj.com/video/news-hub-google-gmail-hit-with-china-based-scam/D
Accountability – who sent
what where?
Ability to trace actions back to a
person, place and time, back to a
system and what processes were
performed on it!
Provided by logs and audit trails.
Accountability
System/Application
Logs
● Ordered list of:
● Events
● Actions
● Must have integrity
● Time Stamped across
entire system
● High Level Actions
(email, web page served)
Audit Trail
● Ordered list of:
● Events
● Actions
● Open files
● Writing to files
● Sending packets
across network
http://www.theguardian.com/money/2011/aug/05/beware-hackers-take-over-gmail-account
Privacy = do you really have any?
Organizations should take necessary precautions
to protect the confidentiality and integrity of
personal information they collect, store and
process.
Some Things to Ponder:
What are the types of threats?
Who is conducting these?
Why?
Internet Security - Lecture I
Internet Security - Lecture I

Weitere ähnliche Inhalte

Was ist angesagt?

IMA - Anatomy of an Attack - Presentation- 28Aug15
IMA - Anatomy of an Attack - Presentation- 28Aug15IMA - Anatomy of an Attack - Presentation- 28Aug15
IMA - Anatomy of an Attack - Presentation- 28Aug15Benjamin D. Brooks, CISSP
 
Ethical hacking & cyber security
Ethical hacking & cyber securityEthical hacking & cyber security
Ethical hacking & cyber securityankit gandharkar
 
Aegis Personal Cybersecurity 101
Aegis Personal Cybersecurity 101Aegis Personal Cybersecurity 101
Aegis Personal Cybersecurity 101Nick Powers
 
TakeDownCon Rocket City: Technology Deathmatch, The arms race is on by Sean B...
TakeDownCon Rocket City: Technology Deathmatch, The arms race is on by Sean B...TakeDownCon Rocket City: Technology Deathmatch, The arms race is on by Sean B...
TakeDownCon Rocket City: Technology Deathmatch, The arms race is on by Sean B...EC-Council
 
Hacking and protecting yourself from hackers .
Hacking and protecting yourself from hackers .Hacking and protecting yourself from hackers .
Hacking and protecting yourself from hackers .Preethi T G
 
Securing Your Digital Files from Legal Threats
Securing Your Digital Files from Legal ThreatsSecuring Your Digital Files from Legal Threats
Securing Your Digital Files from Legal ThreatsAbbie Hosta
 
Lecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss PreventionLecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss PreventionNicholas Davis
 
Data Classification And Loss Prevention
Data Classification And Loss PreventionData Classification And Loss Prevention
Data Classification And Loss PreventionNicholas Davis
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer SecurityVibrant Event
 
CSF18 - For Your Ears Only - Sasha Kranjac
CSF18 - For Your Ears Only - Sasha KranjacCSF18 - For Your Ears Only - Sasha Kranjac
CSF18 - For Your Ears Only - Sasha KranjacNCCOMMS
 
5 Cryptography Part2
5 Cryptography Part25 Cryptography Part2
5 Cryptography Part2Alfred Ouyang
 
Spotlight on GFI EndPoint Security 2013
Spotlight on GFI EndPoint Security 2013Spotlight on GFI EndPoint Security 2013
Spotlight on GFI EndPoint Security 2013GFI Software
 
Latihan6 comp-forensic-bab5
Latihan6 comp-forensic-bab5Latihan6 comp-forensic-bab5
Latihan6 comp-forensic-bab5sabtolinux
 

Was ist angesagt? (18)

IMA - Anatomy of an Attack - Presentation- 28Aug15
IMA - Anatomy of an Attack - Presentation- 28Aug15IMA - Anatomy of an Attack - Presentation- 28Aug15
IMA - Anatomy of an Attack - Presentation- 28Aug15
 
Ethical hacking & cyber security
Ethical hacking & cyber securityEthical hacking & cyber security
Ethical hacking & cyber security
 
Intrusion in computing
Intrusion in computingIntrusion in computing
Intrusion in computing
 
Aegis Personal Cybersecurity 101
Aegis Personal Cybersecurity 101Aegis Personal Cybersecurity 101
Aegis Personal Cybersecurity 101
 
TakeDownCon Rocket City: Technology Deathmatch, The arms race is on by Sean B...
TakeDownCon Rocket City: Technology Deathmatch, The arms race is on by Sean B...TakeDownCon Rocket City: Technology Deathmatch, The arms race is on by Sean B...
TakeDownCon Rocket City: Technology Deathmatch, The arms race is on by Sean B...
 
Hacking and protecting yourself from hackers .
Hacking and protecting yourself from hackers .Hacking and protecting yourself from hackers .
Hacking and protecting yourself from hackers .
 
Information Security
Information SecurityInformation Security
Information Security
 
Securing Your Digital Files from Legal Threats
Securing Your Digital Files from Legal ThreatsSecuring Your Digital Files from Legal Threats
Securing Your Digital Files from Legal Threats
 
Lecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss PreventionLecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss Prevention
 
Data Classification And Loss Prevention
Data Classification And Loss PreventionData Classification And Loss Prevention
Data Classification And Loss Prevention
 
Computer security
Computer securityComputer security
Computer security
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer Security
 
CSF18 - For Your Ears Only - Sasha Kranjac
CSF18 - For Your Ears Only - Sasha KranjacCSF18 - For Your Ears Only - Sasha Kranjac
CSF18 - For Your Ears Only - Sasha Kranjac
 
5 Cryptography Part2
5 Cryptography Part25 Cryptography Part2
5 Cryptography Part2
 
Avila 3 b
Avila 3 bAvila 3 b
Avila 3 b
 
Spotlight on GFI EndPoint Security 2013
Spotlight on GFI EndPoint Security 2013Spotlight on GFI EndPoint Security 2013
Spotlight on GFI EndPoint Security 2013
 
Latihan6 comp-forensic-bab5
Latihan6 comp-forensic-bab5Latihan6 comp-forensic-bab5
Latihan6 comp-forensic-bab5
 
Hacking
HackingHacking
Hacking
 

Andere mochten auch

Ongoing Research -
Ongoing Research - Ongoing Research -
Ongoing Research - Connie White
 
Indiana Public Safety Academy - Social Media in K-12 Schools
Indiana Public Safety Academy - Social Media in K-12 SchoolsIndiana Public Safety Academy - Social Media in K-12 Schools
Indiana Public Safety Academy - Social Media in K-12 SchoolsConnie White
 
Sahana Eden GSoC Social Media Integration
Sahana Eden GSoC Social Media IntegrationSahana Eden GSoC Social Media Integration
Sahana Eden GSoC Social Media IntegrationConnie White
 
Technological Advances Leveraging Use of  Small Unmanned Aerial Vehicles (UAV...
Technological Advances Leveraging Use of  Small Unmanned Aerial Vehicles (UAV...Technological Advances Leveraging Use of  Small Unmanned Aerial Vehicles (UAV...
Technological Advances Leveraging Use of  Small Unmanned Aerial Vehicles (UAV...Connie White
 
Disaster Management Systems: Building Capacity for Developing Countries and ...
Disaster Management Systems: Building Capacity  for Developing Countries and ...Disaster Management Systems: Building Capacity  for Developing Countries and ...
Disaster Management Systems: Building Capacity for Developing Countries and ...Connie White
 
Emergency Management and Social Media in Georgia: The State of Now and The ...
Emergency Management and  Social Media in Georgia:  The State of Now and The ...Emergency Management and  Social Media in Georgia:  The State of Now and The ...
Emergency Management and Social Media in Georgia: The State of Now and The ...Connie White
 
Hope (something we all need)
Hope  (something we all need)Hope  (something we all need)
Hope (something we all need)Billen
 
Crowdfunding - A new way of financing SMEs in Colombia - #ForosMipyme
Crowdfunding  - A new way of financing SMEs in Colombia - #ForosMipymeCrowdfunding  - A new way of financing SMEs in Colombia - #ForosMipyme
Crowdfunding - A new way of financing SMEs in Colombia - #ForosMipymeRonald Kleverlaan
 
Crowdfunding voor startups - meer dan geld alleen (Leergang Entrepreneurial E...
Crowdfunding voor startups - meer dan geld alleen (Leergang Entrepreneurial E...Crowdfunding voor startups - meer dan geld alleen (Leergang Entrepreneurial E...
Crowdfunding voor startups - meer dan geld alleen (Leergang Entrepreneurial E...Ronald Kleverlaan
 
Photosynthesis Part Duex
Photosynthesis Part DuexPhotosynthesis Part Duex
Photosynthesis Part Duexguest0ec0a
 
Rabobank - Crowdfunding: De bank buitenspel?
Rabobank - Crowdfunding: De bank buitenspel?Rabobank - Crowdfunding: De bank buitenspel?
Rabobank - Crowdfunding: De bank buitenspel?Ronald Kleverlaan
 
Dämmen mit seegras aus der Ostsee
Dämmen mit seegras aus der OstseeDämmen mit seegras aus der Ostsee
Dämmen mit seegras aus der OstseeJoern Hartje
 
A Holistic Approach to Evaluating Social Media's Successful Implementation in...
A Holistic Approach to Evaluating Social Media's Successful Implementation in...A Holistic Approach to Evaluating Social Media's Successful Implementation in...
A Holistic Approach to Evaluating Social Media's Successful Implementation in...Connie White
 
Settling North America
Settling North AmericaSettling North America
Settling North Americaawltech
 
1660 S M Oper R4
1660 S M  Oper  R41660 S M  Oper  R4
1660 S M Oper R4Fxx
 

Andere mochten auch (20)

Ongoing Research -
Ongoing Research - Ongoing Research -
Ongoing Research -
 
Indiana Public Safety Academy - Social Media in K-12 Schools
Indiana Public Safety Academy - Social Media in K-12 SchoolsIndiana Public Safety Academy - Social Media in K-12 Schools
Indiana Public Safety Academy - Social Media in K-12 Schools
 
Sahana Eden GSoC Social Media Integration
Sahana Eden GSoC Social Media IntegrationSahana Eden GSoC Social Media Integration
Sahana Eden GSoC Social Media Integration
 
Technological Advances Leveraging Use of  Small Unmanned Aerial Vehicles (UAV...
Technological Advances Leveraging Use of  Small Unmanned Aerial Vehicles (UAV...Technological Advances Leveraging Use of  Small Unmanned Aerial Vehicles (UAV...
Technological Advances Leveraging Use of  Small Unmanned Aerial Vehicles (UAV...
 
Disaster Management Systems: Building Capacity for Developing Countries and ...
Disaster Management Systems: Building Capacity  for Developing Countries and ...Disaster Management Systems: Building Capacity  for Developing Countries and ...
Disaster Management Systems: Building Capacity for Developing Countries and ...
 
Emergency Management and Social Media in Georgia: The State of Now and The ...
Emergency Management and  Social Media in Georgia:  The State of Now and The ...Emergency Management and  Social Media in Georgia:  The State of Now and The ...
Emergency Management and Social Media in Georgia: The State of Now and The ...
 
Hope (something we all need)
Hope  (something we all need)Hope  (something we all need)
Hope (something we all need)
 
Crowdfunding - A new way of financing SMEs in Colombia - #ForosMipyme
Crowdfunding  - A new way of financing SMEs in Colombia - #ForosMipymeCrowdfunding  - A new way of financing SMEs in Colombia - #ForosMipyme
Crowdfunding - A new way of financing SMEs in Colombia - #ForosMipyme
 
Grease Monkey
Grease MonkeyGrease Monkey
Grease Monkey
 
Crowdfunding voor startups - meer dan geld alleen (Leergang Entrepreneurial E...
Crowdfunding voor startups - meer dan geld alleen (Leergang Entrepreneurial E...Crowdfunding voor startups - meer dan geld alleen (Leergang Entrepreneurial E...
Crowdfunding voor startups - meer dan geld alleen (Leergang Entrepreneurial E...
 
Ochoa marmex
Ochoa marmexOchoa marmex
Ochoa marmex
 
Photosynthesis Part Duex
Photosynthesis Part DuexPhotosynthesis Part Duex
Photosynthesis Part Duex
 
Ochoa marmex
Ochoa marmexOchoa marmex
Ochoa marmex
 
Rabobank - Crowdfunding: De bank buitenspel?
Rabobank - Crowdfunding: De bank buitenspel?Rabobank - Crowdfunding: De bank buitenspel?
Rabobank - Crowdfunding: De bank buitenspel?
 
Dämmen mit seegras aus der Ostsee
Dämmen mit seegras aus der OstseeDämmen mit seegras aus der Ostsee
Dämmen mit seegras aus der Ostsee
 
This is a test
This is a testThis is a test
This is a test
 
A Holistic Approach to Evaluating Social Media's Successful Implementation in...
A Holistic Approach to Evaluating Social Media's Successful Implementation in...A Holistic Approach to Evaluating Social Media's Successful Implementation in...
A Holistic Approach to Evaluating Social Media's Successful Implementation in...
 
Settling North America
Settling North AmericaSettling North America
Settling North America
 
Wind Map
Wind MapWind Map
Wind Map
 
1660 S M Oper R4
1660 S M  Oper  R41660 S M  Oper  R4
1660 S M Oper R4
 

Ähnlich wie Internet Security - Lecture I

Cloud Security.pptx
Cloud Security.pptxCloud Security.pptx
Cloud Security.pptxBinod Rimal
 
Hacking and Penetration Testing - a beginners guide
Hacking and Penetration Testing - a beginners guideHacking and Penetration Testing - a beginners guide
Hacking and Penetration Testing - a beginners guidePankaj Dubey
 
Basic Security Chapter 1
Basic Security Chapter 1Basic Security Chapter 1
Basic Security Chapter 1AfiqEfendy Zaen
 
Computer security ppt for computer science student.pptx
Computer security ppt for computer science student.pptxComputer security ppt for computer science student.pptx
Computer security ppt for computer science student.pptxdagiabebe267
 
Cyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxCyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxRoshni814224
 
Cassandra Lunch #90: Securing Apache Cassandra
Cassandra Lunch #90: Securing Apache CassandraCassandra Lunch #90: Securing Apache Cassandra
Cassandra Lunch #90: Securing Apache CassandraAnant Corporation
 
Will My SaaS Provider Leak My Corporate Data? - Collaborate '15 Presentation
Will My SaaS Provider Leak My Corporate Data? - Collaborate '15 PresentationWill My SaaS Provider Leak My Corporate Data? - Collaborate '15 Presentation
Will My SaaS Provider Leak My Corporate Data? - Collaborate '15 PresentationSnag
 
LIS3353 SP12 Week 9
LIS3353 SP12 Week 9LIS3353 SP12 Week 9
LIS3353 SP12 Week 9Amanda Case
 
chapter13 - Computing Security Ethics.pdf
chapter13 - Computing Security Ethics.pdfchapter13 - Computing Security Ethics.pdf
chapter13 - Computing Security Ethics.pdfsatonaka3
 
IT Security & Risk
IT Security & Risk IT Security & Risk
IT Security & Risk Tanujpandey5
 
DRC - Cybersecurity Concepts 2015 - 5 Basics you must know!
DRC  - Cybersecurity Concepts 2015 - 5 Basics you must know!DRC  - Cybersecurity Concepts 2015 - 5 Basics you must know!
DRC - Cybersecurity Concepts 2015 - 5 Basics you must know!Kevin Fisher
 
Why Insider Threat is a C-Level Priority
Why Insider Threat is a C-Level PriorityWhy Insider Threat is a C-Level Priority
Why Insider Threat is a C-Level PriorityDavid Mai, MBA
 
Why Insider Threat is a C-Level Priority
Why Insider Threat is a C-Level PriorityWhy Insider Threat is a C-Level Priority
Why Insider Threat is a C-Level PriorityObserveIT
 
Introduction to Hacking
Introduction to HackingIntroduction to Hacking
Introduction to HackingRishabha Garg
 
The Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
The Hacker Playbook: How to Think like a Cybercriminal to Reduce RiskThe Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
The Hacker Playbook: How to Think like a Cybercriminal to Reduce RiskBeyondTrust
 

Ähnlich wie Internet Security - Lecture I (20)

Cloud Security.pptx
Cloud Security.pptxCloud Security.pptx
Cloud Security.pptx
 
Hacking and Penetration Testing - a beginners guide
Hacking and Penetration Testing - a beginners guideHacking and Penetration Testing - a beginners guide
Hacking and Penetration Testing - a beginners guide
 
Basic Security Chapter 1
Basic Security Chapter 1Basic Security Chapter 1
Basic Security Chapter 1
 
Secure Software Design for Data Privacy
Secure Software Design for Data PrivacySecure Software Design for Data Privacy
Secure Software Design for Data Privacy
 
Computer security ppt for computer science student.pptx
Computer security ppt for computer science student.pptxComputer security ppt for computer science student.pptx
Computer security ppt for computer science student.pptx
 
Information Security
Information SecurityInformation Security
Information Security
 
Cyber Security Briefing
Cyber Security BriefingCyber Security Briefing
Cyber Security Briefing
 
Cyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxCyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptx
 
Cassandra Lunch #90: Securing Apache Cassandra
Cassandra Lunch #90: Securing Apache CassandraCassandra Lunch #90: Securing Apache Cassandra
Cassandra Lunch #90: Securing Apache Cassandra
 
Will My SaaS Provider Leak My Corporate Data? - Collaborate '15 Presentation
Will My SaaS Provider Leak My Corporate Data? - Collaborate '15 PresentationWill My SaaS Provider Leak My Corporate Data? - Collaborate '15 Presentation
Will My SaaS Provider Leak My Corporate Data? - Collaborate '15 Presentation
 
LIS3353 SP12 Week 9
LIS3353 SP12 Week 9LIS3353 SP12 Week 9
LIS3353 SP12 Week 9
 
chapter13 - Computing Security Ethics.pdf
chapter13 - Computing Security Ethics.pdfchapter13 - Computing Security Ethics.pdf
chapter13 - Computing Security Ethics.pdf
 
IT Security & Risk
IT Security & Risk IT Security & Risk
IT Security & Risk
 
DRC - Cybersecurity Concepts 2015 - 5 Basics you must know!
DRC  - Cybersecurity Concepts 2015 - 5 Basics you must know!DRC  - Cybersecurity Concepts 2015 - 5 Basics you must know!
DRC - Cybersecurity Concepts 2015 - 5 Basics you must know!
 
Why Insider Threat is a C-Level Priority
Why Insider Threat is a C-Level PriorityWhy Insider Threat is a C-Level Priority
Why Insider Threat is a C-Level Priority
 
Why Insider Threat is a C-Level Priority
Why Insider Threat is a C-Level PriorityWhy Insider Threat is a C-Level Priority
Why Insider Threat is a C-Level Priority
 
Unit v
Unit vUnit v
Unit v
 
Introduction to Hacking
Introduction to HackingIntroduction to Hacking
Introduction to Hacking
 
The Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
The Hacker Playbook: How to Think like a Cybercriminal to Reduce RiskThe Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
The Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
 
001.itsecurity bcp v1
001.itsecurity bcp v1001.itsecurity bcp v1
001.itsecurity bcp v1
 

Mehr von Connie White

Social Media, Crisis Communication, Emergency Mgmt & Drone Technology in Heal...
Social Media, Crisis Communication, Emergency Mgmt & Drone Technology in Heal...Social Media, Crisis Communication, Emergency Mgmt & Drone Technology in Heal...
Social Media, Crisis Communication, Emergency Mgmt & Drone Technology in Heal...Connie White
 
Emergency Management Information System Support Rectifying 1st Responder Role...
Emergency Management Information System Support Rectifying 1st Responder Role...Emergency Management Information System Support Rectifying 1st Responder Role...
Emergency Management Information System Support Rectifying 1st Responder Role...Connie White
 
Disaster Management Systems: Building Capacity for Developing Countries and ...
Disaster Management Systems: Building Capacity  for Developing Countries and ...Disaster Management Systems: Building Capacity  for Developing Countries and ...
Disaster Management Systems: Building Capacity for Developing Countries and ...Connie White
 
Build a Better Mousetrap? Social Media Cultivating Emergency Management Com...
Build a Better Mousetrap?   Social Media Cultivating Emergency Management Com...Build a Better Mousetrap?   Social Media Cultivating Emergency Management Com...
Build a Better Mousetrap? Social Media Cultivating Emergency Management Com...Connie White
 
Decision making during extreme events
Decision making during extreme eventsDecision making during extreme events
Decision making during extreme eventsConnie White
 
An Online Social Network for Emergency Management
An Online Social Network for Emergency ManagementAn Online Social Network for Emergency Management
An Online Social Network for Emergency ManagementConnie White
 
Web 2.0 Technology Building Situational Awareness: Free and Open Source Too...
Web 2.0 Technology  Building Situational Awareness:  Free and Open Source Too...Web 2.0 Technology  Building Situational Awareness:  Free and Open Source Too...
Web 2.0 Technology Building Situational Awareness: Free and Open Source Too...Connie White
 
Social Media Empowering a Global Response #IDCExpo
Social Media Empowering a Global Response #IDCExpoSocial Media Empowering a Global Response #IDCExpo
Social Media Empowering a Global Response #IDCExpoConnie White
 
EMEC Germany: Social Media for Emergency Management
EMEC Germany: Social Media for Emergency ManagementEMEC Germany: Social Media for Emergency Management
EMEC Germany: Social Media for Emergency ManagementConnie White
 
Social Media, Crisis Communication and Emergency Management: Leveraging Web 2...
Social Media, Crisis Communication and Emergency Management: Leveraging Web 2...Social Media, Crisis Communication and Emergency Management: Leveraging Web 2...
Social Media, Crisis Communication and Emergency Management: Leveraging Web 2...Connie White
 
Social Media in Crisis Management: ISCRAM Summer School 2011
Social Media in Crisis Management: ISCRAM Summer School 2011Social Media in Crisis Management: ISCRAM Summer School 2011
Social Media in Crisis Management: ISCRAM Summer School 2011Connie White
 
Situational Awareness 2.0 #EMAG2011
Situational Awareness 2.0 #EMAG2011 Situational Awareness 2.0 #EMAG2011
Situational Awareness 2.0 #EMAG2011 Connie White
 
#EMAG2011 Use Social Media Now for Emergency Management
#EMAG2011 Use Social Media Now for Emergency Management#EMAG2011 Use Social Media Now for Emergency Management
#EMAG2011 Use Social Media Now for Emergency ManagementConnie White
 
Cherokee County Tornado Drill testing Social Media
Cherokee County Tornado Drill testing Social MediaCherokee County Tornado Drill testing Social Media
Cherokee County Tornado Drill testing Social MediaConnie White
 
Sahana Foundation’s Response to Haiti Earthquake
Sahana Foundation’s Response to Haiti EarthquakeSahana Foundation’s Response to Haiti Earthquake
Sahana Foundation’s Response to Haiti EarthquakeConnie White
 
Italian Version: Disasters 2.0: Collaborazione in Tempo Reale: Documentazione...
Italian Version: Disasters 2.0: Collaborazione in Tempo Reale: Documentazione...Italian Version: Disasters 2.0: Collaborazione in Tempo Reale: Documentazione...
Italian Version: Disasters 2.0: Collaborazione in Tempo Reale: Documentazione...Connie White
 
Spanish Version: Disasters 2.0 Colaboración en Tiempo Real: Documentación y M...
Spanish Version: Disasters 2.0 Colaboración en Tiempo Real: Documentación y M...Spanish Version: Disasters 2.0 Colaboración en Tiempo Real: Documentación y M...
Spanish Version: Disasters 2.0 Colaboración en Tiempo Real: Documentación y M...Connie White
 
Mandarin Version: Disaster 2.0: Real Time Collaboration: Documentation and Ma...
Mandarin Version: Disaster 2.0: Real Time Collaboration: Documentation and Ma...Mandarin Version: Disaster 2.0: Real Time Collaboration: Documentation and Ma...
Mandarin Version: Disaster 2.0: Real Time Collaboration: Documentation and Ma...Connie White
 
Disasters 2.0: Real Time Collaboration: Documentation and Mapping
Disasters 2.0: Real Time Collaboration: Documentation and MappingDisasters 2.0: Real Time Collaboration: Documentation and Mapping
Disasters 2.0: Real Time Collaboration: Documentation and MappingConnie White
 
Web 3.0 What is it?
Web 3.0  What is it?Web 3.0  What is it?
Web 3.0 What is it?Connie White
 

Mehr von Connie White (20)

Social Media, Crisis Communication, Emergency Mgmt & Drone Technology in Heal...
Social Media, Crisis Communication, Emergency Mgmt & Drone Technology in Heal...Social Media, Crisis Communication, Emergency Mgmt & Drone Technology in Heal...
Social Media, Crisis Communication, Emergency Mgmt & Drone Technology in Heal...
 
Emergency Management Information System Support Rectifying 1st Responder Role...
Emergency Management Information System Support Rectifying 1st Responder Role...Emergency Management Information System Support Rectifying 1st Responder Role...
Emergency Management Information System Support Rectifying 1st Responder Role...
 
Disaster Management Systems: Building Capacity for Developing Countries and ...
Disaster Management Systems: Building Capacity  for Developing Countries and ...Disaster Management Systems: Building Capacity  for Developing Countries and ...
Disaster Management Systems: Building Capacity for Developing Countries and ...
 
Build a Better Mousetrap? Social Media Cultivating Emergency Management Com...
Build a Better Mousetrap?   Social Media Cultivating Emergency Management Com...Build a Better Mousetrap?   Social Media Cultivating Emergency Management Com...
Build a Better Mousetrap? Social Media Cultivating Emergency Management Com...
 
Decision making during extreme events
Decision making during extreme eventsDecision making during extreme events
Decision making during extreme events
 
An Online Social Network for Emergency Management
An Online Social Network for Emergency ManagementAn Online Social Network for Emergency Management
An Online Social Network for Emergency Management
 
Web 2.0 Technology Building Situational Awareness: Free and Open Source Too...
Web 2.0 Technology  Building Situational Awareness:  Free and Open Source Too...Web 2.0 Technology  Building Situational Awareness:  Free and Open Source Too...
Web 2.0 Technology Building Situational Awareness: Free and Open Source Too...
 
Social Media Empowering a Global Response #IDCExpo
Social Media Empowering a Global Response #IDCExpoSocial Media Empowering a Global Response #IDCExpo
Social Media Empowering a Global Response #IDCExpo
 
EMEC Germany: Social Media for Emergency Management
EMEC Germany: Social Media for Emergency ManagementEMEC Germany: Social Media for Emergency Management
EMEC Germany: Social Media for Emergency Management
 
Social Media, Crisis Communication and Emergency Management: Leveraging Web 2...
Social Media, Crisis Communication and Emergency Management: Leveraging Web 2...Social Media, Crisis Communication and Emergency Management: Leveraging Web 2...
Social Media, Crisis Communication and Emergency Management: Leveraging Web 2...
 
Social Media in Crisis Management: ISCRAM Summer School 2011
Social Media in Crisis Management: ISCRAM Summer School 2011Social Media in Crisis Management: ISCRAM Summer School 2011
Social Media in Crisis Management: ISCRAM Summer School 2011
 
Situational Awareness 2.0 #EMAG2011
Situational Awareness 2.0 #EMAG2011 Situational Awareness 2.0 #EMAG2011
Situational Awareness 2.0 #EMAG2011
 
#EMAG2011 Use Social Media Now for Emergency Management
#EMAG2011 Use Social Media Now for Emergency Management#EMAG2011 Use Social Media Now for Emergency Management
#EMAG2011 Use Social Media Now for Emergency Management
 
Cherokee County Tornado Drill testing Social Media
Cherokee County Tornado Drill testing Social MediaCherokee County Tornado Drill testing Social Media
Cherokee County Tornado Drill testing Social Media
 
Sahana Foundation’s Response to Haiti Earthquake
Sahana Foundation’s Response to Haiti EarthquakeSahana Foundation’s Response to Haiti Earthquake
Sahana Foundation’s Response to Haiti Earthquake
 
Italian Version: Disasters 2.0: Collaborazione in Tempo Reale: Documentazione...
Italian Version: Disasters 2.0: Collaborazione in Tempo Reale: Documentazione...Italian Version: Disasters 2.0: Collaborazione in Tempo Reale: Documentazione...
Italian Version: Disasters 2.0: Collaborazione in Tempo Reale: Documentazione...
 
Spanish Version: Disasters 2.0 Colaboración en Tiempo Real: Documentación y M...
Spanish Version: Disasters 2.0 Colaboración en Tiempo Real: Documentación y M...Spanish Version: Disasters 2.0 Colaboración en Tiempo Real: Documentación y M...
Spanish Version: Disasters 2.0 Colaboración en Tiempo Real: Documentación y M...
 
Mandarin Version: Disaster 2.0: Real Time Collaboration: Documentation and Ma...
Mandarin Version: Disaster 2.0: Real Time Collaboration: Documentation and Ma...Mandarin Version: Disaster 2.0: Real Time Collaboration: Documentation and Ma...
Mandarin Version: Disaster 2.0: Real Time Collaboration: Documentation and Ma...
 
Disasters 2.0: Real Time Collaboration: Documentation and Mapping
Disasters 2.0: Real Time Collaboration: Documentation and MappingDisasters 2.0: Real Time Collaboration: Documentation and Mapping
Disasters 2.0: Real Time Collaboration: Documentation and Mapping
 
Web 3.0 What is it?
Web 3.0  What is it?Web 3.0  What is it?
Web 3.0 What is it?
 

Kürzlich hochgeladen

social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 

Kürzlich hochgeladen (20)

social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 

Internet Security - Lecture I