<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:cc="http://web.resource.org/cc/" xmlns:media="http://search.yahoo.com/mrss/" version="2.0">
  <channel>
    <title>RSS feed for Information security</title>
    <link>https://www.open.edu/openlearn/science-maths-technology/information-security/content-section-0</link>
    <description>This RSS feed contains all the sections in Information security</description>
    <generator>Moodle</generator>
    <copyright>Copyright © 2016 The Open University</copyright>
    <image>
      <url>https://www.open.edu/openlearn/ocw/theme/image.php/_s/openlearnng/core/1552489361/i/rsssitelogo</url>
      <title>moodle</title>
      <link>https://www.open.edu/openlearn/ocw</link>
      <width>140</width>
      <height>35</height>
    </image>
    <language>en-gb</language><lastBuildDate>Wed, 13 Mar 2019 15:31:08 +0000</lastBuildDate><pubDate>Wed, 13 Mar 2019 15:31:08 +0000</pubDate><dc:date>2019-03-13T15:31:08+00:00</dc:date><dc:publisher>The Open University</dc:publisher><dc:language>en-gb</dc:language><dc:rights>Copyright © 2016 The Open University</dc:rights><cc:license>Copyright © 2016 The Open University</cc:license><item>
      <title>Introduction</title>
      <link>https://www.open.edu/openlearn/science-maths-technology/information-security/content-section-0</link>
      <pubDate>Thu, 23 Jun 2016 10:43:46 GMT</pubDate>
      <description>&lt;p&gt;With the advent of information systems, information has become the life blood of the modern world. Given its importance, modern organisations aren’t always as careful as they could be with it. Whether it’s their customer details, details of their business transactions or their intellectual property, information is – almost casually – shared when it shouldn’t be.&lt;/p&gt;&lt;p&gt;In this free course, &lt;i&gt;Information security&lt;/i&gt;, you’ll explore what it is about information that makes it so valuable.&lt;/p&gt;&lt;p&gt;Given that information security is critical in organisations, this course assumes that you have an organisation that you can study. This could, for instance, be your employer, a professional body, a local shop, a library or even your doctors’ surgery.&lt;/p&gt;&lt;p&gt;This OpenLearn course is an adapted extract from the Open University course &lt;span class="oucontent-linkwithtip"&gt;&lt;a class="oucontent-hyperlink" href="http://www.open.ac.uk/postgraduate/modules/m811?utm_source=openlearn&amp;amp;utm_campaign=ou&amp;amp;utm_medium=ebook"&gt;M811 &lt;i&gt;Information security&lt;/i&gt;&lt;/a&gt;&lt;/span&gt;.&lt;/p&gt;</description>
      <guid isPermaLink="true">https://www.open.edu/openlearn/science-maths-technology/information-security/content-section-0</guid>
    <dc:title>Introduction</dc:title><dc:identifier>M811_1</dc:identifier><dc:description>&lt;p&gt;With the advent of information systems, information has become the life blood of the modern world. Given its importance, modern organisations aren’t always as careful as they could be with it. Whether it’s their customer details, details of their business transactions or their intellectual property, information is – almost casually – shared when it shouldn’t be.&lt;/p&gt;&lt;p&gt;In this free course, &lt;i&gt;Information security&lt;/i&gt;, you’ll explore what it is about information that makes it so valuable.&lt;/p&gt;&lt;p&gt;Given that information security is critical in organisations, this course assumes that you have an organisation that you can study. This could, for instance, be your employer, a professional body, a local shop, a library or even your doctors’ surgery.&lt;/p&gt;&lt;p&gt;This OpenLearn course is an adapted extract from the Open University course &lt;span class="oucontent-linkwithtip"&gt;&lt;a class="oucontent-hyperlink" href="http://www.open.ac.uk/postgraduate/modules/m811?utm_source=openlearn&amp;utm_campaign=ou&amp;utm_medium=ebook"&gt;M811 &lt;i&gt;Information security&lt;/i&gt;&lt;/a&gt;&lt;/span&gt;.&lt;/p&gt;</dc:description><dc:publisher>The Open University</dc:publisher><dc:creator>The Open University</dc:creator><dc:type>Course</dc:type><dc:format>text/html</dc:format><dc:language>en-GB</dc:language><dc:source>Information security - M811_1</dc:source><cc:license>Copyright © 2016 The Open University</cc:license></item>
    <item>
      <title>Learning outcomes</title>
      <link>https://www.open.edu/openlearn/science-maths-technology/information-security/content-section---learningoutcomes</link>
      <pubDate>Thu, 23 Jun 2016 10:43:46 GMT</pubDate>
      <description>&lt;p&gt;After studying this course, you should be able to:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;p&gt;define what information is&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;appreciate the value of information to the modern organisation&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;understand the CIA triad of Confidentiality, Integrity and Availability&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;appreciate the difficulties that arise when valuable information needs to be shared&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;identify the five leading-edge resources that have up-to-date information on information security.&lt;/p&gt;&lt;/li&gt;&lt;/ul&gt;</description>
      <guid isPermaLink="true">https://www.open.edu/openlearn/science-maths-technology/information-security/content-section---learningoutcomes</guid>
    <dc:title>Learning outcomes</dc:title><dc:identifier>M811_1</dc:identifier><dc:description>&lt;p&gt;After studying this course, you should be able to:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;p&gt;define what information is&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;appreciate the value of information to the modern organisation&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;understand the CIA triad of Confidentiality, Integrity and Availability&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;appreciate the difficulties that arise when valuable information needs to be shared&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;identify the five leading-edge resources that have up-to-date information on information security.&lt;/p&gt;&lt;/li&gt;&lt;/ul&gt;</dc:description><dc:publisher>The Open University</dc:publisher><dc:creator>The Open University</dc:creator><dc:type>Course</dc:type><dc:format>text/html</dc:format><dc:language>en-GB</dc:language><dc:source>Information security - M811_1</dc:source><cc:license>Copyright © 2016 The Open University</cc:license></item>
    <item>
      <title>1 Information: the heart of everything with value</title>
      <link>https://www.open.edu/openlearn/science-maths-technology/information-security/content-section-1</link>
      <pubDate>Thu, 23 Jun 2016 10:43:46 GMT</pubDate>
      <description>&lt;p&gt;In May 2016, Coca-Cola’s shareholders valued the company at almost US $200 billion. Their accountants placed its value at US $24.91 billion (Wolfram Alpha, 2016a).&lt;/p&gt;&lt;p&gt;Why the difference? Is this just accountants being prissy?&lt;/p&gt;&lt;p&gt;Well, no. Accountants like to work on the realised value of the company, called &lt;i&gt;book value&lt;/i&gt;; that is the total value of its tangible assets: its property, computers, manufacturing plant etc.&lt;/p&gt;&lt;p&gt;In contrast, shareholders value the things in a company that can make money, called it’s &lt;i&gt;market value&lt;/i&gt;. So on top of the tangible assets, their interest includes the information that a company holds. For Coca-Cola, that includes John S. Pemberton’s famous recipe which, according to Coca-Cola’s investors, could be worth anything up to US $175bn.&lt;/p&gt;&lt;div class="&amp;#10;            oucontent-activity&amp;#10;           oucontent-s-heavybox1 oucontent-s-box "&gt;&lt;div class="oucontent-outer-box"&gt;&lt;h2 class="oucontent-h3 oucontent-heading oucontent-nonumber"&gt;Activity 1: Coca-Cola’s secret recipe&lt;/h2&gt;&lt;div class="oucontent-inner-box"&gt;&lt;div class="oucontent-saq-question"&gt;&lt;p&gt;Using Wikipedia – or a similar online tool – find out what you can about the recipe for Coca-Cola.&lt;/p&gt;&lt;/div&gt;

&lt;div class="oucontent-saq-discussion"&gt;&lt;h3 class="oucontent-h4"&gt;Discussion&lt;/h3&gt;&lt;p&gt;From &lt;span class="oucontent-linkwithtip"&gt;&lt;a class="oucontent-hyperlink" href="https://en.wikipedia.org/wiki/Coca-Cola_formula#Pemberton_recipe"&gt;Wikipedia&lt;/a&gt;&lt;/span&gt; (2016a), it appears that the secret of the recipe comes down to the &amp;#x2018;7X formula’, a special blend of oils, herbs and spices such as orange, cinnamon and coriander. Wikipedia lists them and their proportions, but we don’t know for certain whether Coca-Cola actually&amp;#xA0;contains them nor their proportions.&lt;/p&gt;&lt;p&gt;You might like to try making it.&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
      <guid isPermaLink="true">https://www.open.edu/openlearn/science-maths-technology/information-security/content-section-1</guid>
    <dc:title>1 Information: the heart of everything with value</dc:title><dc:identifier>M811_1</dc:identifier><dc:description>&lt;p&gt;In May 2016, Coca-Cola’s shareholders valued the company at almost US $200 billion. Their accountants placed its value at US $24.91 billion (Wolfram Alpha, 2016a).&lt;/p&gt;&lt;p&gt;Why the difference? Is this just accountants being prissy?&lt;/p&gt;&lt;p&gt;Well, no. Accountants like to work on the realised value of the company, called &lt;i&gt;book value&lt;/i&gt;; that is the total value of its tangible assets: its property, computers, manufacturing plant etc.&lt;/p&gt;&lt;p&gt;In contrast, shareholders value the things in a company that can make money, called it’s &lt;i&gt;market value&lt;/i&gt;. So on top of the tangible assets, their interest includes the information that a company holds. For Coca-Cola, that includes John S. Pemberton’s famous recipe which, according to Coca-Cola’s investors, could be worth anything up to US $175bn.&lt;/p&gt;&lt;div class="
            oucontent-activity
           oucontent-s-heavybox1 oucontent-s-box "&gt;&lt;div class="oucontent-outer-box"&gt;&lt;h2 class="oucontent-h3 oucontent-heading oucontent-nonumber"&gt;Activity 1: Coca-Cola’s secret recipe&lt;/h2&gt;&lt;div class="oucontent-inner-box"&gt;&lt;div class="oucontent-saq-question"&gt;&lt;p&gt;Using Wikipedia – or a similar online tool – find out what you can about the recipe for Coca-Cola.&lt;/p&gt;&lt;/div&gt;

&lt;div class="oucontent-saq-discussion"&gt;&lt;h3 class="oucontent-h4"&gt;Discussion&lt;/h3&gt;&lt;p&gt;From &lt;span class="oucontent-linkwithtip"&gt;&lt;a class="oucontent-hyperlink" href="https://en.wikipedia.org/wiki/Coca-Cola_formula#Pemberton_recipe"&gt;Wikipedia&lt;/a&gt;&lt;/span&gt; (2016a), it appears that the secret of the recipe comes down to the ‘7X formula’, a special blend of oils, herbs and spices such as orange, cinnamon and coriander. Wikipedia lists them and their proportions, but we don’t know for certain whether Coca-Cola actually contains them nor their proportions.&lt;/p&gt;&lt;p&gt;You might like to try making it.&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</dc:description><dc:publisher>The Open University</dc:publisher><dc:creator>The Open University</dc:creator><dc:type>Course</dc:type><dc:format>text/html</dc:format><dc:language>en-GB</dc:language><dc:source>Information security - M811_1</dc:source><cc:license>Copyright © 2016 The Open University</cc:license></item>
    <item>
      <title>1.1 Social networks</title>
      <link>https://www.open.edu/openlearn/science-maths-technology/information-security/content-section-1.1</link>
      <pubDate>Thu, 23 Jun 2016 10:43:46 GMT</pubDate>
      <description>&lt;p&gt;Comparing book and market value once again, the information collected by Facebook on their 1.23 billion monthly active users is worth almost a quarter of a trillion dollars (Wolfram Alpha, 2016b). This information includes some (apparently pretty tame stuff) you give when you sign up: your name, city of birth, city of residence, email address. Some you will give as a matter of course, such as relationship status, family members, birthday etc.&lt;/p&gt;&lt;p&gt;However, Facebook’s massive market value is the value to advertisers of the information you give up as you use Facebook to log your life. This includes what you’ve liked and disliked, which restaurants you’ve eaten at (so what foods you like), which sports teams you support&amp;#xA0;(so which sports clothing you might like to buy), which videos you have watched (so which films you might like to buy) etc.&lt;/p&gt;&lt;p&gt;Print media – such as newspapers – once had a monopoly on ad-supported news. Because they printed only one version, in those days they used to say that half of every advertising budget was wasted, you just couldn’t know which half. Now, with Facebook, every advert that is placed in front of you is determined precisely by algorithms; algorithms that use what Facebook know about you to get the best bang-for-the-buck for an advertiser.&lt;/p&gt;&lt;div class="&amp;#10;            oucontent-activity&amp;#10;           oucontent-s-heavybox1 oucontent-s-box "&gt;&lt;div class="oucontent-outer-box"&gt;&lt;h2 class="oucontent-h3 oucontent-heading oucontent-nonumber"&gt;Activity 2: The value of information to Facebook&lt;/h2&gt;&lt;div class="oucontent-inner-box"&gt;&lt;div class="oucontent-saq-question"&gt;&lt;p&gt;Given the following information about a Facebook user, what value could it have for targeting an advert?&lt;/p&gt;&lt;ul class="oucontent-bulleted"&gt;&lt;li&gt;websites visited&lt;/li&gt;&lt;li&gt;companies liked&lt;/li&gt;&lt;li&gt;their current mood&lt;/li&gt;&lt;li&gt;device they’ve accessed the internet from&lt;/li&gt;&lt;li&gt;their credit-card details&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;

&lt;div class="oucontent-saq-discussion"&gt;&lt;h3 class="oucontent-h4"&gt;Discussion&lt;/h3&gt;&lt;p&gt;We came up with:&lt;/p&gt;&lt;ul class="oucontent-bulleted"&gt;&lt;li&gt;websites visited: Facebook could offer similar websites&lt;/li&gt;&lt;li&gt;companies liked: Facebook could offer competitors companies’ products&lt;/li&gt;&lt;li&gt;their current mood: Facebook could offer champagne adverts for a user who is celebrating, or man-size tissues to those who are unhappy&lt;/li&gt;&lt;li&gt;device they’ve accessed the internet from: Facebook know what mobile phone you have and so could offer games for that phone&lt;/li&gt;&lt;li&gt;their credit-card details: Facebook could offer special services for competing credit cards, with special cash-back deals.&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
      <guid isPermaLink="true">https://www.open.edu/openlearn/science-maths-technology/information-security/content-section-1.1</guid>
    <dc:title>1.1 Social networks</dc:title><dc:identifier>M811_1</dc:identifier><dc:description>&lt;p&gt;Comparing book and market value once again, the information collected by Facebook on their 1.23 billion monthly active users is worth almost a quarter of a trillion dollars (Wolfram Alpha, 2016b). This information includes some (apparently pretty tame stuff) you give when you sign up: your name, city of birth, city of residence, email address. Some you will give as a matter of course, such as relationship status, family members, birthday etc.&lt;/p&gt;&lt;p&gt;However, Facebook’s massive market value is the value to advertisers of the information you give up as you use Facebook to log your life. This includes what you’ve liked and disliked, which restaurants you’ve eaten at (so what foods you like), which sports teams you support (so which sports clothing you might like to buy), which videos you have watched (so which films you might like to buy) etc.&lt;/p&gt;&lt;p&gt;Print media – such as newspapers – once had a monopoly on ad-supported news. Because they printed only one version, in those days they used to say that half of every advertising budget was wasted, you just couldn’t know which half. Now, with Facebook, every advert that is placed in front of you is determined precisely by algorithms; algorithms that use what Facebook know about you to get the best bang-for-the-buck for an advertiser.&lt;/p&gt;&lt;div class="
            oucontent-activity
           oucontent-s-heavybox1 oucontent-s-box "&gt;&lt;div class="oucontent-outer-box"&gt;&lt;h2 class="oucontent-h3 oucontent-heading oucontent-nonumber"&gt;Activity 2: The value of information to Facebook&lt;/h2&gt;&lt;div class="oucontent-inner-box"&gt;&lt;div class="oucontent-saq-question"&gt;&lt;p&gt;Given the following information about a Facebook user, what value could it have for targeting an advert?&lt;/p&gt;&lt;ul class="oucontent-bulleted"&gt;&lt;li&gt;websites visited&lt;/li&gt;&lt;li&gt;companies liked&lt;/li&gt;&lt;li&gt;their current mood&lt;/li&gt;&lt;li&gt;device they’ve accessed the internet from&lt;/li&gt;&lt;li&gt;their credit-card details&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;

&lt;div class="oucontent-saq-discussion"&gt;&lt;h3 class="oucontent-h4"&gt;Discussion&lt;/h3&gt;&lt;p&gt;We came up with:&lt;/p&gt;&lt;ul class="oucontent-bulleted"&gt;&lt;li&gt;websites visited: Facebook could offer similar websites&lt;/li&gt;&lt;li&gt;companies liked: Facebook could offer competitors companies’ products&lt;/li&gt;&lt;li&gt;their current mood: Facebook could offer champagne adverts for a user who is celebrating, or man-size tissues to those who are unhappy&lt;/li&gt;&lt;li&gt;device they’ve accessed the internet from: Facebook know what mobile phone you have and so could offer games for that phone&lt;/li&gt;&lt;li&gt;their credit-card details: Facebook could offer special services for competing credit cards, with special cash-back deals.&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</dc:description><dc:publisher>The Open University</dc:publisher><dc:creator>The Open University</dc:creator><dc:type>Course</dc:type><dc:format>text/html</dc:format><dc:language>en-GB</dc:language><dc:source>Information security - M811_1</dc:source><cc:license>Copyright © 2016 The Open University</cc:license></item>
    <item>
      <title>1.2 What is information?</title>
      <link>https://www.open.edu/openlearn/science-maths-technology/information-security/content-section-1.2</link>
      <pubDate>Thu, 23 Jun 2016 10:43:46 GMT</pubDate>
      <description>&lt;p&gt;Information comprises the meanings and interpretations that people – and increasingly algorithms – place upon facts or data. The value of information springs from the ways it is interpreted and applied to make products – like Coca-Cola – and to provide services –&amp;#xA0;like Facebook does for its advertisers.&lt;/p&gt;&lt;p&gt;As we have seen, and supported by academic writers such as Itami and Roehl (1987), the true value of an organisation is in the information it uses and creates.&lt;/p&gt;&lt;div class="&amp;#10;            oucontent-activity&amp;#10;           oucontent-s-heavybox1 oucontent-s-box "&gt;&lt;div class="oucontent-outer-box"&gt;&lt;h2 class="oucontent-h3 oucontent-heading oucontent-nonumber"&gt;Activity 3: You and your organisation’s need for information&lt;/h2&gt;&lt;div class="oucontent-inner-box"&gt;&lt;div class="oucontent-saq-question"&gt;&lt;ul class="oucontent-numbered"&gt;&lt;li class="oucontent-markerdirect"&gt;&lt;span class="oucontent-listmarker"&gt;a.&lt;/span&gt;Write down the main objective – sometimes called the mission – of your organisation.&lt;/li&gt;&lt;li class="oucontent-markerdirect"&gt;&lt;span class="oucontent-listmarker"&gt;b.&lt;/span&gt;List the main kinds of information your organisation requires to meet its mission. Note down any areas in which the mission makes preserving the value of information difficult.&lt;/li&gt;&lt;li class="oucontent-markerdirect"&gt;&lt;span class="oucontent-listmarker"&gt;c.&lt;/span&gt;List the main kinds of information you have at home.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;b&gt;Guidance&lt;/b&gt;&lt;/p&gt;&lt;ul class="oucontent-bulleted"&gt;&lt;li&gt;Your answer to (b) will depend on the nature of your organisation. If your organisation produces a product, you may be able to identify information that is used in the creation of the product, including intellectual property such as designs and patents. If your organisation is a retailer, appropriate information might include customer information and price lists. A not-for-profit organisation will perhaps have employee lists, client lists, stock lists, a charter, etc. All for-profit organisations are required to keep financial information.&lt;/li&gt;&lt;li&gt;In your answer to (c), don’t restrict yourself to paper documents.&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;

&lt;div class="oucontent-saq-discussion"&gt;&lt;h3 class="oucontent-h4"&gt;Discussion&lt;/h3&gt;&lt;ul class="oucontent-numbered"&gt;&lt;li class="oucontent-markerdirect"&gt;&lt;span class="oucontent-listmarker"&gt;a.&lt;/span&gt;The mission of The Open University is to be:&lt;ol class="oucontent-numbered"&gt;&lt;li&gt;open to people – making university study available to an increasingly large and diverse student body and providing learning opportunities that meet individuals’ lifelong needs&lt;/li&gt;&lt;li&gt;open to places – providing learning opportunities in the home, workplace and community throughout the UK and selectively elsewhere, and serving an increasingly mobile population&lt;/li&gt;&lt;li&gt;open to methods – using and developing the most effective media and technologies for learning, teaching and assessment while attaching central importance to the personal academic support given to students; and working collaboratively with others to extend and enrich lifelong learning&lt;/li&gt;&lt;li&gt;open to ideas – developing a vibrant academic community that reflects and supports the diversity of intellectual interests of all our students and staff, and that is dedicated to the advancement and sharing of knowledge through research and scholarship.&lt;/li&gt;&lt;/ol&gt;&lt;/li&gt;&lt;li class="oucontent-markerdirect"&gt;&lt;span class="oucontent-listmarker"&gt;b.&lt;/span&gt;Within The Open University there are very many types of information that are required to meet this mission. Examples include the following:&lt;ol class="oucontent-numbered"&gt;&lt;li&gt;Teaching information – this information is provided in the huge range of courses that the OU produces, thus supporting the first, third and fourth of the mission statements. By providing teaching information in a variety of formats, including printed text and electronic text, the second mission statement is supported too.&lt;/li&gt;&lt;li&gt;Research information – this information is embodied in the research documents written by OU researchers, and supports the third and fourth mission statements.&lt;/li&gt;&lt;li&gt;Administrative information – an example is provided by the student records kept on courses studied and results, one use is to allow the OU to suggest appropriate choices of future study, thus supporting the first mission statement.&lt;/li&gt;&lt;li&gt;Strategic information – such information includes documents that explore the possible future of the OU, including proposed buildings, academic programmes and catering plans, thus providing support for all the mission statements.&lt;/li&gt;&lt;/ol&gt;&lt;ul class="oucontent-unnumbered"&gt;&lt;li&gt;In fact the teaching and research information also provide the basis for much of the OU’s funding, thus indirectly supporting all four mission statements.&lt;/li&gt;&lt;li&gt;The openness expressed in the mission makes the value of information difficult to preserve, and so this openness needs to be tempered by some measure of &amp;#x2018;closedness’, to protect the OU’s competitive advantage in teaching, for instance.&lt;/li&gt;&lt;/ul&gt;&lt;/li&gt;&lt;li class="oucontent-markerdirect"&gt;&lt;span class="oucontent-listmarker"&gt;c.&lt;/span&gt;Looking around my home office, there is a great deal of paper on the shelves. Much of this is academic work and books, but there is also a great number of documents relating to insurance policies, credit and debit cards and bank accounts. On my pinboard are all my receipts for the financial year. Somewhere there are the deeds to my family’s home.&lt;p&gt;Additionally, my computer is full of information. For example, there are all the latest drafts of this course, all my email, applications, licences, bibliographic databases, my CV, the latest drafts of my PhD students’ reports etc.&lt;/p&gt;&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
      <guid isPermaLink="true">https://www.open.edu/openlearn/science-maths-technology/information-security/content-section-1.2</guid>
    <dc:title>1.2 What is information?</dc:title><dc:identifier>M811_1</dc:identifier><dc:description>&lt;p&gt;Information comprises the meanings and interpretations that people – and increasingly algorithms – place upon facts or data. The value of information springs from the ways it is interpreted and applied to make products – like Coca-Cola – and to provide services – like Facebook does for its advertisers.&lt;/p&gt;&lt;p&gt;As we have seen, and supported by academic writers such as Itami and Roehl (1987), the true value of an organisation is in the information it uses and creates.&lt;/p&gt;&lt;div class="
            oucontent-activity
           oucontent-s-heavybox1 oucontent-s-box "&gt;&lt;div class="oucontent-outer-box"&gt;&lt;h2 class="oucontent-h3 oucontent-heading oucontent-nonumber"&gt;Activity 3: You and your organisation’s need for information&lt;/h2&gt;&lt;div class="oucontent-inner-box"&gt;&lt;div class="oucontent-saq-question"&gt;&lt;ul class="oucontent-numbered"&gt;&lt;li class="oucontent-markerdirect"&gt;&lt;span class="oucontent-listmarker"&gt;a.&lt;/span&gt;Write down the main objective – sometimes called the mission – of your organisation.&lt;/li&gt;&lt;li class="oucontent-markerdirect"&gt;&lt;span class="oucontent-listmarker"&gt;b.&lt;/span&gt;List the main kinds of information your organisation requires to meet its mission. Note down any areas in which the mission makes preserving the value of information difficult.&lt;/li&gt;&lt;li class="oucontent-markerdirect"&gt;&lt;span class="oucontent-listmarker"&gt;c.&lt;/span&gt;List the main kinds of information you have at home.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;b&gt;Guidance&lt;/b&gt;&lt;/p&gt;&lt;ul class="oucontent-bulleted"&gt;&lt;li&gt;Your answer to (b) will depend on the nature of your organisation. If your organisation produces a product, you may be able to identify information that is used in the creation of the product, including intellectual property such as designs and patents. If your organisation is a retailer, appropriate information might include customer information and price lists. A not-for-profit organisation will perhaps have employee lists, client lists, stock lists, a charter, etc. All for-profit organisations are required to keep financial information.&lt;/li&gt;&lt;li&gt;In your answer to (c), don’t restrict yourself to paper documents.&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;

&lt;div class="oucontent-saq-discussion"&gt;&lt;h3 class="oucontent-h4"&gt;Discussion&lt;/h3&gt;&lt;ul class="oucontent-numbered"&gt;&lt;li class="oucontent-markerdirect"&gt;&lt;span class="oucontent-listmarker"&gt;a.&lt;/span&gt;The mission of The Open University is to be:&lt;ol class="oucontent-numbered"&gt;&lt;li&gt;open to people – making university study available to an increasingly large and diverse student body and providing learning opportunities that meet individuals’ lifelong needs&lt;/li&gt;&lt;li&gt;open to places – providing learning opportunities in the home, workplace and community throughout the UK and selectively elsewhere, and serving an increasingly mobile population&lt;/li&gt;&lt;li&gt;open to methods – using and developing the most effective media and technologies for learning, teaching and assessment while attaching central importance to the personal academic support given to students; and working collaboratively with others to extend and enrich lifelong learning&lt;/li&gt;&lt;li&gt;open to ideas – developing a vibrant academic community that reflects and supports the diversity of intellectual interests of all our students and staff, and that is dedicated to the advancement and sharing of knowledge through research and scholarship.&lt;/li&gt;&lt;/ol&gt;&lt;/li&gt;&lt;li class="oucontent-markerdirect"&gt;&lt;span class="oucontent-listmarker"&gt;b.&lt;/span&gt;Within The Open University there are very many types of information that are required to meet this mission. Examples include the following:&lt;ol class="oucontent-numbered"&gt;&lt;li&gt;Teaching information – this information is provided in the huge range of courses that the OU produces, thus supporting the first, third and fourth of the mission statements. By providing teaching information in a variety of formats, including printed text and electronic text, the second mission statement is supported too.&lt;/li&gt;&lt;li&gt;Research information – this information is embodied in the research documents written by OU researchers, and supports the third and fourth mission statements.&lt;/li&gt;&lt;li&gt;Administrative information – an example is provided by the student records kept on courses studied and results, one use is to allow the OU to suggest appropriate choices of future study, thus supporting the first mission statement.&lt;/li&gt;&lt;li&gt;Strategic information – such information includes documents that explore the possible future of the OU, including proposed buildings, academic programmes and catering plans, thus providing support for all the mission statements.&lt;/li&gt;&lt;/ol&gt;&lt;ul class="oucontent-unnumbered"&gt;&lt;li&gt;In fact the teaching and research information also provide the basis for much of the OU’s funding, thus indirectly supporting all four mission statements.&lt;/li&gt;&lt;li&gt;The openness expressed in the mission makes the value of information difficult to preserve, and so this openness needs to be tempered by some measure of ‘closedness’, to protect the OU’s competitive advantage in teaching, for instance.&lt;/li&gt;&lt;/ul&gt;&lt;/li&gt;&lt;li class="oucontent-markerdirect"&gt;&lt;span class="oucontent-listmarker"&gt;c.&lt;/span&gt;Looking around my home office, there is a great deal of paper on the shelves. Much of this is academic work and books, but there is also a great number of documents relating to insurance policies, credit and debit cards and bank accounts. On my pinboard are all my receipts for the financial year. Somewhere there are the deeds to my family’s home.&lt;p&gt;Additionally, my computer is full of information. For example, there are all the latest drafts of this course, all my email, applications, licences, bibliographic databases, my CV, the latest drafts of my PhD students’ reports etc.&lt;/p&gt;&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</dc:description><dc:publisher>The Open University</dc:publisher><dc:creator>The Open University</dc:creator><dc:type>Course</dc:type><dc:format>text/html</dc:format><dc:language>en-GB</dc:language><dc:source>Information security - M811_1</dc:source><cc:license>Copyright © 2016 The Open University</cc:license></item>
    <item>
      <title>2 Information security</title>
      <link>https://www.open.edu/openlearn/science-maths-technology/information-security/content-section-2</link>
      <pubDate>Thu, 23 Jun 2016 10:43:46 GMT</pubDate>
      <description>&lt;p&gt;It’s safe to say that Coca-Cola would never share its secret recipe with anyone other than the chosen few. Facebook, too, are unlikely to share the information they have on their users with those that would advertise. Keeping that information secret keeps the value that it has inside their companies. Some information needs to be kept &lt;i&gt;confidential&lt;/i&gt;.&lt;/p&gt;&lt;p&gt;Of course, if confidentiality was paramount, we could simply lock the recipe up in a safe and throw away the key. Even more drastic, we could just burn every last copy of it. But that would mean that Coca-Cola’s shareholders would lose interest in investing as the source of its ability to make money would have disappeared. So information has to be available when needed.&lt;/p&gt;&lt;p&gt;Moreover, when it is needed, it must be correct otherwise, when you come to use it, you won’t end up with Coca-Cola. The information contained in it needs integrity – in the sense that it should be whole and undivided, i.e. correct.&lt;/p&gt;&lt;p&gt;There is sometimes a difficult balance to be made between the Confidentiality, Integrity and Availability – the &lt;i&gt;CIA triad&lt;/i&gt; –&amp;#xA0;of information. Information security is the art and science of getting that balance right.&lt;/p&gt;&lt;div class="&amp;#10;            oucontent-activity&amp;#10;           oucontent-s-heavybox1 oucontent-s-box "&gt;&lt;div class="oucontent-outer-box"&gt;&lt;h2 class="oucontent-h3 oucontent-heading oucontent-nonumber"&gt;Activity 4: CIA for your organisation’s information&lt;/h2&gt;&lt;div class="oucontent-inner-box"&gt;&lt;div class="oucontent-saq-question"&gt;&lt;p&gt;Choose a piece of information whose value is critical for your organisation.&lt;/p&gt;&lt;ul class="oucontent-numbered"&gt;&lt;li class="oucontent-markerdirect"&gt;&lt;span class="oucontent-listmarker"&gt;a.&lt;/span&gt;To which of the three security requirements is it subject? Why?&lt;/li&gt;&lt;li class="oucontent-markerdirect"&gt;&lt;span class="oucontent-listmarker"&gt;b.&lt;/span&gt;Thinking about each of confidentiality, integrity and availability in turn, how would you balance the CIA triad for it?&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;

&lt;div class="oucontent-saq-discussion"&gt;&lt;h3 class="oucontent-h4"&gt;Discussion&lt;/h3&gt;&lt;p&gt;We chose Open University assessment material, which contains information to the mission of The Open University in allowing us to validate a student’s study. Thus, it is critical to get the CIA triad correct.&lt;/p&gt;&lt;ul class="oucontent-numbered"&gt;&lt;li class="oucontent-markerdirect"&gt;&lt;span class="oucontent-listmarker"&gt;a.&lt;/span&gt;Open University assessment material is subject to the following requirements:&lt;ul class="oucontent-bulleted"&gt;&lt;li&gt;They’re highly confidential. In the case of an examination paper, if it was disclosed to students before the exam date, it would lose its value.&lt;/li&gt;&lt;li&gt;They need to have integrity. Assessment with errors would cause problems for both students, who might be confused, and The Open University, as they would interfere with the marking of a student’s work.&lt;/li&gt;&lt;li&gt;They have to be available – in the right place at the right time. If, for instance, a course exam paper wasn’t available at an examination centre on the day of the exam it would again have no value.&lt;/li&gt;&lt;/ul&gt;&lt;/li&gt;&lt;li class="oucontent-markerdirect"&gt;&lt;span class="oucontent-listmarker"&gt;b.&lt;/span&gt;Let’s think about an exam paper&lt;ul class="oucontent-bulleted"&gt;&lt;li&gt;Confidentiality. The information in the exam paper needs to be kept confidential as it is (i) authored and checked and (ii) distributed to the exam centre. First, I need to know who can be trusted and who can’t. I’m going to assume that people who get paid by The Open University – for instance academics, external examiners etc. – can be trusted, but others can’t.&lt;p&gt;The process of authoring and checking the exam paper could take many months, and in that time it might need to be shared by many people, both inside and outside of the University. I know that email isn’t really confidential, so I’m going to stop the exam paper being attached to an email, unless it is password protected. Internal post isn’t secure, so I’ll ask that people walk to collect the exam paper whenever necessary. However, there are now paid for secure services that I might also look into.&lt;/p&gt;&lt;p&gt;To keep it confidential while they’re on their way to the exam centre, the exam paper will be in a tamper-proof box, so that the courier –&amp;#xA0;who won’t work for The Open University –&amp;#xA0;doesn’t need to be trusted.&lt;/p&gt;&lt;/li&gt;&lt;li&gt;Integrity. I’m going to ensure that there are lots of different sets of eyes on the exam paper so that errors will be spotted. I’m going to give responsibility for catching those errors both to the author and to the external examiner both of whom will have to formally sign off on the exam paper, confirming it’s error-free. That should get us most of the way. If all that fails and on the day someone spots an error on the paper, I’ll make sure there’s an academic no more than a telephone call away to check and quickly release a fix, if the error is confirmed.&lt;/li&gt;&lt;li&gt;Availability. I know where the exam paper needs to be and on which day, so I’m going to book a courier service to pick the exam paper up from The Open University the day before, making sure it gets to its correct destination. The courier will deliver the paper to a named person who works in the examination centre at the other end. They will have responsibility to deliver it to where the examination is taking place.&lt;/li&gt;&lt;/ul&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Given that you chose different information assets, your analysis will be different. However, perhaps you asked the same questions: who could you trust? What services can be used? Who does what? If not, have another go and try to answer those questions too.&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
      <guid isPermaLink="true">https://www.open.edu/openlearn/science-maths-technology/information-security/content-section-2</guid>
    <dc:title>2 Information security</dc:title><dc:identifier>M811_1</dc:identifier><dc:description>&lt;p&gt;It’s safe to say that Coca-Cola would never share its secret recipe with anyone other than the chosen few. Facebook, too, are unlikely to share the information they have on their users with those that would advertise. Keeping that information secret keeps the value that it has inside their companies. Some information needs to be kept &lt;i&gt;confidential&lt;/i&gt;.&lt;/p&gt;&lt;p&gt;Of course, if confidentiality was paramount, we could simply lock the recipe up in a safe and throw away the key. Even more drastic, we could just burn every last copy of it. But that would mean that Coca-Cola’s shareholders would lose interest in investing as the source of its ability to make money would have disappeared. So information has to be available when needed.&lt;/p&gt;&lt;p&gt;Moreover, when it is needed, it must be correct otherwise, when you come to use it, you won’t end up with Coca-Cola. The information contained in it needs integrity – in the sense that it should be whole and undivided, i.e. correct.&lt;/p&gt;&lt;p&gt;There is sometimes a difficult balance to be made between the Confidentiality, Integrity and Availability – the &lt;i&gt;CIA triad&lt;/i&gt; – of information. Information security is the art and science of getting that balance right.&lt;/p&gt;&lt;div class="
            oucontent-activity
           oucontent-s-heavybox1 oucontent-s-box "&gt;&lt;div class="oucontent-outer-box"&gt;&lt;h2 class="oucontent-h3 oucontent-heading oucontent-nonumber"&gt;Activity 4: CIA for your organisation’s information&lt;/h2&gt;&lt;div class="oucontent-inner-box"&gt;&lt;div class="oucontent-saq-question"&gt;&lt;p&gt;Choose a piece of information whose value is critical for your organisation.&lt;/p&gt;&lt;ul class="oucontent-numbered"&gt;&lt;li class="oucontent-markerdirect"&gt;&lt;span class="oucontent-listmarker"&gt;a.&lt;/span&gt;To which of the three security requirements is it subject? Why?&lt;/li&gt;&lt;li class="oucontent-markerdirect"&gt;&lt;span class="oucontent-listmarker"&gt;b.&lt;/span&gt;Thinking about each of confidentiality, integrity and availability in turn, how would you balance the CIA triad for it?&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;

&lt;div class="oucontent-saq-discussion"&gt;&lt;h3 class="oucontent-h4"&gt;Discussion&lt;/h3&gt;&lt;p&gt;We chose Open University assessment material, which contains information to the mission of The Open University in allowing us to validate a student’s study. Thus, it is critical to get the CIA triad correct.&lt;/p&gt;&lt;ul class="oucontent-numbered"&gt;&lt;li class="oucontent-markerdirect"&gt;&lt;span class="oucontent-listmarker"&gt;a.&lt;/span&gt;Open University assessment material is subject to the following requirements:&lt;ul class="oucontent-bulleted"&gt;&lt;li&gt;They’re highly confidential. In the case of an examination paper, if it was disclosed to students before the exam date, it would lose its value.&lt;/li&gt;&lt;li&gt;They need to have integrity. Assessment with errors would cause problems for both students, who might be confused, and The Open University, as they would interfere with the marking of a student’s work.&lt;/li&gt;&lt;li&gt;They have to be available – in the right place at the right time. If, for instance, a course exam paper wasn’t available at an examination centre on the day of the exam it would again have no value.&lt;/li&gt;&lt;/ul&gt;&lt;/li&gt;&lt;li class="oucontent-markerdirect"&gt;&lt;span class="oucontent-listmarker"&gt;b.&lt;/span&gt;Let’s think about an exam paper&lt;ul class="oucontent-bulleted"&gt;&lt;li&gt;Confidentiality. The information in the exam paper needs to be kept confidential as it is (i) authored and checked and (ii) distributed to the exam centre. First, I need to know who can be trusted and who can’t. I’m going to assume that people who get paid by The Open University – for instance academics, external examiners etc. – can be trusted, but others can’t.&lt;p&gt;The process of authoring and checking the exam paper could take many months, and in that time it might need to be shared by many people, both inside and outside of the University. I know that email isn’t really confidential, so I’m going to stop the exam paper being attached to an email, unless it is password protected. Internal post isn’t secure, so I’ll ask that people walk to collect the exam paper whenever necessary. However, there are now paid for secure services that I might also look into.&lt;/p&gt;&lt;p&gt;To keep it confidential while they’re on their way to the exam centre, the exam paper will be in a tamper-proof box, so that the courier – who won’t work for The Open University – doesn’t need to be trusted.&lt;/p&gt;&lt;/li&gt;&lt;li&gt;Integrity. I’m going to ensure that there are lots of different sets of eyes on the exam paper so that errors will be spotted. I’m going to give responsibility for catching those errors both to the author and to the external examiner both of whom will have to formally sign off on the exam paper, confirming it’s error-free. That should get us most of the way. If all that fails and on the day someone spots an error on the paper, I’ll make sure there’s an academic no more than a telephone call away to check and quickly release a fix, if the error is confirmed.&lt;/li&gt;&lt;li&gt;Availability. I know where the exam paper needs to be and on which day, so I’m going to book a courier service to pick the exam paper up from The Open University the day before, making sure it gets to its correct destination. The courier will deliver the paper to a named person who works in the examination centre at the other end. They will have responsibility to deliver it to where the examination is taking place.&lt;/li&gt;&lt;/ul&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Given that you chose different information assets, your analysis will be different. However, perhaps you asked the same questions: who could you trust? What services can be used? Who does what? If not, have another go and try to answer those questions too.&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</dc:description><dc:publisher>The Open University</dc:publisher><dc:creator>The Open University</dc:creator><dc:type>Course</dc:type><dc:format>text/html</dc:format><dc:language>en-GB</dc:language><dc:source>Information security - M811_1</dc:source><cc:license>Copyright © 2016 The Open University</cc:license></item>
    <item>
      <title>2.1 Other things to think about</title>
      <link>https://www.open.edu/openlearn/science-maths-technology/information-security/content-section-2.1</link>
      <pubDate>Thu, 23 Jun 2016 10:43:46 GMT</pubDate>
      <description>&lt;p&gt;If balancing the CIA triad wasn’t difficult enough, when sharing information, an organisation needs to be aware of the various laws, regulatory frameworks and codes of practice under which they operate. In the worst case, failure to comply with these can lead to disciplinary and/or legal action against board members. In such situations, directors and managers are duty bound to be cautious and vigilant.&lt;/p&gt;&lt;p&gt;But then again, the rewards of the e-business age can be immense and the creation of value is a big driver: as we have seen, information has become a powerful source of shareholder value, and may contribute massively to its ability to meet its mission. As organisations become more and more dependent on their information systems, pressure is increasing to get it right.&lt;/p&gt;&lt;div class="&amp;#10;            oucontent-activity&amp;#10;           oucontent-s-heavybox1 oucontent-s-box "&gt;&lt;div class="oucontent-outer-box"&gt;&lt;h2 class="oucontent-h3 oucontent-heading oucontent-nonumber"&gt;Activity 5: What can happen when it goes wrong?&lt;/h2&gt;&lt;div class="oucontent-inner-box"&gt;&lt;div class="oucontent-saq-question"&gt;&lt;p&gt;Read the web page &amp;#x2018;&lt;span class="oucontent-linkwithtip"&gt;&lt;a class="oucontent-hyperlink" href="http://www.csoonline.com/article/2130877/data-protection/data-protection-the-15-worst-data-security-breaches-of-the-21st-century.html"&gt;The 15 worst data security breaches of the 21st Century&lt;/a&gt;&lt;/span&gt;’ (Armerding, 2012) and estimate the number of people affected by these data security breaches.&lt;/p&gt;&lt;p&gt;If the world population is approximately eight billion people, what is the likelihood of an individual being affected by one of the top 15 information security breaches?&lt;/p&gt;&lt;/div&gt;

&lt;div class="oucontent-saq-discussion"&gt;&lt;h3 class="oucontent-h4"&gt;Discussion&lt;/h3&gt;&lt;p&gt;Ignoring those who were affected twice or more, we calculated that almost 453 million people were affected by the top 15 breaches. Adding together the figures in the article, we calculated that almost half a billion people were affected by the top 15 breaches. Given that there are 8 billion people, that’s 1 in 16. You might like to check whether your details have been released by visiting&amp;#xA0;&lt;a class="oucontent-hyperlink" href="https://haveibeenpwned.com"&gt;have i been pwned?&lt;/a&gt; (Hunt, 2016).&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
      <guid isPermaLink="true">https://www.open.edu/openlearn/science-maths-technology/information-security/content-section-2.1</guid>
    <dc:title>2.1 Other things to think about</dc:title><dc:identifier>M811_1</dc:identifier><dc:description>&lt;p&gt;If balancing the CIA triad wasn’t difficult enough, when sharing information, an organisation needs to be aware of the various laws, regulatory frameworks and codes of practice under which they operate. In the worst case, failure to comply with these can lead to disciplinary and/or legal action against board members. In such situations, directors and managers are duty bound to be cautious and vigilant.&lt;/p&gt;&lt;p&gt;But then again, the rewards of the e-business age can be immense and the creation of value is a big driver: as we have seen, information has become a powerful source of shareholder value, and may contribute massively to its ability to meet its mission. As organisations become more and more dependent on their information systems, pressure is increasing to get it right.&lt;/p&gt;&lt;div class="
            oucontent-activity
           oucontent-s-heavybox1 oucontent-s-box "&gt;&lt;div class="oucontent-outer-box"&gt;&lt;h2 class="oucontent-h3 oucontent-heading oucontent-nonumber"&gt;Activity 5: What can happen when it goes wrong?&lt;/h2&gt;&lt;div class="oucontent-inner-box"&gt;&lt;div class="oucontent-saq-question"&gt;&lt;p&gt;Read the web page ‘&lt;span class="oucontent-linkwithtip"&gt;&lt;a class="oucontent-hyperlink" href="http://www.csoonline.com/article/2130877/data-protection/data-protection-the-15-worst-data-security-breaches-of-the-21st-century.html"&gt;The 15 worst data security breaches of the 21st Century&lt;/a&gt;&lt;/span&gt;’ (Armerding, 2012) and estimate the number of people affected by these data security breaches.&lt;/p&gt;&lt;p&gt;If the world population is approximately eight billion people, what is the likelihood of an individual being affected by one of the top 15 information security breaches?&lt;/p&gt;&lt;/div&gt;

&lt;div class="oucontent-saq-discussion"&gt;&lt;h3 class="oucontent-h4"&gt;Discussion&lt;/h3&gt;&lt;p&gt;Ignoring those who were affected twice or more, we calculated that almost 453 million people were affected by the top 15 breaches. Adding together the figures in the article, we calculated that almost half a billion people were affected by the top 15 breaches. Given that there are 8 billion people, that’s 1 in 16. You might like to check whether your details have been released by visiting &lt;a class="oucontent-hyperlink" href="https://haveibeenpwned.com"&gt;have i been pwned?&lt;/a&gt; (Hunt, 2016).&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</dc:description><dc:publisher>The Open University</dc:publisher><dc:creator>The Open University</dc:creator><dc:type>Course</dc:type><dc:format>text/html</dc:format><dc:language>en-GB</dc:language><dc:source>Information security - M811_1</dc:source><cc:license>Copyright © 2016 The Open University</cc:license></item>
    <item>
      <title>3 Tracking the leading edge</title>
      <link>https://www.open.edu/openlearn/science-maths-technology/information-security/content-section-3</link>
      <pubDate>Thu, 23 Jun 2016 10:43:46 GMT</pubDate>
      <description>&lt;p&gt;Like many computing topics, information security sits in a turbulent landscape and, like the weather, it is sometimes easier to see what will happen in the long term (five or ten years hence) than what will happen tomorrow. There is a constant turnover of technologies, research, organisations and commentators that makes it difficult to:&lt;/p&gt;&lt;ul class="oucontent-bulleted"&gt;&lt;li&gt;keep tabs on the issues that arise on a day-to-day basis and to know which are the issues that you should be concerned about&lt;/li&gt;&lt;li&gt;know where to turn to find information – and an in-depth evaluation – about those issues.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;In this section you will survey the industry’s response to these issues. The response isn’t centralised in a single website but in the work of hundreds of individuals, either acting alone or on behalf of their organisation. The resources that they provide in the form of podcasts and other assets form the richest of resources for navigating the turbulent landscape of InfoSec (information security).&lt;/p&gt;&lt;p&gt;Even with such rich resources it won’t be possible to predict tomorrow’s headlines in information security. For example, which organisation will lose &lt;span class="oucontent-linkwithtip"&gt;&lt;a class="oucontent-hyperlink" href="http://thenextweb.com/insider/2012/12/24/belgian-rail-firm-sncb-europe-sees-1-5m-customer-details-leaked-but-fails-to-take-responsibility/"&gt;their customers' personal details to a hacker&lt;/a&gt;&lt;/span&gt; (Protalinski, 2013), which virus will strike &lt;a class="oucontent-hyperlink" href="http://en.wikipedia.org/wiki/Stuxnet"&gt;complex processing control machinery&lt;/a&gt; (Wikipedia, 2016b) or which minister will divulge important policy details through a photograph of their meeting notes.&lt;/p&gt;&lt;div class="oucontent-figure oucontent-media-mini"&gt;&lt;img src="https://www.open.edu/openlearn/ocw/pluginfile.php/702359/mod_oucontent/oucontent/34834/0f6e2860/2870c157/m811_1_ol_stduy_unite_2_figure1.jpg" alt="" width="341" height="314" style="max-width:341px;" class="oucontent-figure-image"/&gt;&lt;div class="oucontent-figure-text"&gt;&lt;div class="oucontent-caption oucontent-nonumber"&gt;&lt;span class="oucontent-figure-caption"&gt;&lt;b&gt;Figure 1&lt;/b&gt; A minister leaving Downing Street with briefing notes clearly readable with a long lens camera&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;p&gt;Nor can anyone predict the immediate or long-term response to such things: which legislation and regulation will be introduced or amended to require 2048 bit encoding of customer details, or the requirement that ministers must use opaque wallets for carrying meeting notes.&lt;/p&gt;&lt;p&gt;However, by staying up-to-date with regularly updated web resources, you may be in a better position to respond to InfoSec issues – both personally and within your organisation.&lt;/p&gt;</description>
      <guid isPermaLink="true">https://www.open.edu/openlearn/science-maths-technology/information-security/content-section-3</guid>
    <dc:title>3 Tracking the leading edge</dc:title><dc:identifier>M811_1</dc:identifier><dc:description>&lt;p&gt;Like many computing topics, information security sits in a turbulent landscape and, like the weather, it is sometimes easier to see what will happen in the long term (five or ten years hence) than what will happen tomorrow. There is a constant turnover of technologies, research, organisations and commentators that makes it difficult to:&lt;/p&gt;&lt;ul class="oucontent-bulleted"&gt;&lt;li&gt;keep tabs on the issues that arise on a day-to-day basis and to know which are the issues that you should be concerned about&lt;/li&gt;&lt;li&gt;know where to turn to find information – and an in-depth evaluation – about those issues.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;In this section you will survey the industry’s response to these issues. The response isn’t centralised in a single website but in the work of hundreds of individuals, either acting alone or on behalf of their organisation. The resources that they provide in the form of podcasts and other assets form the richest of resources for navigating the turbulent landscape of InfoSec (information security).&lt;/p&gt;&lt;p&gt;Even with such rich resources it won’t be possible to predict tomorrow’s headlines in information security. For example, which organisation will lose &lt;span class="oucontent-linkwithtip"&gt;&lt;a class="oucontent-hyperlink" href="http://thenextweb.com/insider/2012/12/24/belgian-rail-firm-sncb-europe-sees-1-5m-customer-details-leaked-but-fails-to-take-responsibility/"&gt;their customers' personal details to a hacker&lt;/a&gt;&lt;/span&gt; (Protalinski, 2013), which virus will strike &lt;a class="oucontent-hyperlink" href="http://en.wikipedia.org/wiki/Stuxnet"&gt;complex processing control machinery&lt;/a&gt; (Wikipedia, 2016b) or which minister will divulge important policy details through a photograph of their meeting notes.&lt;/p&gt;&lt;div class="oucontent-figure oucontent-media-mini"&gt;&lt;img src="https://www.open.edu/openlearn/ocw/pluginfile.php/702359/mod_oucontent/oucontent/34834/0f6e2860/2870c157/m811_1_ol_stduy_unite_2_figure1.jpg" alt="" width="341" height="314" style="max-width:341px;" class="oucontent-figure-image"/&gt;&lt;div class="oucontent-figure-text"&gt;&lt;div class="oucontent-caption oucontent-nonumber"&gt;&lt;span class="oucontent-figure-caption"&gt;&lt;b&gt;Figure 1&lt;/b&gt; A minister leaving Downing Street with briefing notes clearly readable with a long lens camera&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;p&gt;Nor can anyone predict the immediate or long-term response to such things: which legislation and regulation will be introduced or amended to require 2048 bit encoding of customer details, or the requirement that ministers must use opaque wallets for carrying meeting notes.&lt;/p&gt;&lt;p&gt;However, by staying up-to-date with regularly updated web resources, you may be in a better position to respond to InfoSec issues – both personally and within your organisation.&lt;/p&gt;</dc:description><dc:publisher>The Open University</dc:publisher><dc:creator>The Open University</dc:creator><dc:type>Course</dc:type><dc:format>text/html</dc:format><dc:language>en-GB</dc:language><dc:source>Information security - M811_1</dc:source><cc:license>Copyright © 2016 The Open University</cc:license></item>
    <item>
      <title>3.1 Which podcasts and blogs?</title>
      <link>https://www.open.edu/openlearn/science-maths-technology/information-security/content-section-3.1</link>
      <pubDate>Thu, 23 Jun 2016 10:43:46 GMT</pubDate>
      <description>&lt;p&gt;At the time of writing, the blog &lt;span class="oucontent-linkwithtip"&gt;&lt;a class="oucontent-hyperlink" href="https://wordpress.com/activity/"&gt;WordPress.com&lt;/a&gt;&lt;/span&gt; boasts of&amp;#xA0;having over 400 million people viewing more than 22.3 billion pages each month! According to the Pew Research Center (2012), over 91,000 podcasts were produced in 2011 alone. Finding the most relevant resources from all of these is a difficult task and one that will get more difficult as the number of blogs and podcasts increases.&lt;/p&gt;&lt;p&gt;With a focus on information security, however, the number of relevant web resources comes down to a more manageable number. However, not all podcasts are equal: they vary in content, presentation, sound quality and support (for example, the availability of transcripts, resource lists and other supporting material). For instance:&lt;/p&gt;&lt;ul class="oucontent-bulleted"&gt;&lt;li&gt;Podcasts on InfoSec are generally, but not exclusively, produced in the US.&lt;/li&gt;&lt;li&gt;Podcasts vary greatly in their length, from fewer than ten minutes to an hour or more, and so finding and managing the time to engage with them can be a challenge.&lt;/li&gt;&lt;li&gt;A popular podcast format is an unscripted conversation between experts. Such podcasts can sometimes appear unfocused, containing material only loosely related to the topic and shallow in their coverage. Whether you grow to like this &amp;#x2018;feature’ of a podcast or not is unimportant.&lt;/li&gt;&lt;li&gt;There are a great number of podcasts which contain content related to InfoSec without being dedicated to InfoSec.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Because of this, and because no two students’ capabilities or interests are the same, we suggest a range of podcasts to work with. Feel free to find your own!&lt;/p&gt;&lt;div class="&amp;#10;            oucontent-activity&amp;#10;           oucontent-s-heavybox1 oucontent-s-box "&gt;&lt;div class="oucontent-outer-box"&gt;&lt;h2 class="oucontent-h3 oucontent-heading oucontent-nonumber"&gt;Activity 6: Tracking the leading edge&lt;/h2&gt;&lt;div class="oucontent-inner-box"&gt;&lt;div class="oucontent-saq-question"&gt;&lt;p&gt;Have a quick look at the list of podcasts contained below, and make a note of any web resources that jump out at you as interesting. For example, if you are working within the banking industry you may find that the &amp;#x2018;Banking Industry Security Podcast’ stands out. There are specialist podcasts for Business Leaders, Cyberlaw, Government and Healthcare. Bruce Schneier's Crypto-Gram Security Podcast is also very popular.&lt;/p&gt;&lt;p&gt;After those, listen to at least two more podcasts. If you enjoy them, they can become quite addictive.&lt;/p&gt;&lt;p&gt;The way&amp;#xA0;that you access these web resources is up to you – the lists contain links for (where available) both iTunes and standalone versions of the podcasts.&lt;/p&gt;&lt;p&gt;Instructions for accessing podcasts through iTunes are available in the &lt;a class="oucontent-hyperlink" href="http://www.apple.com/uk/itunes/podcasts"&gt;Podcast section&lt;/a&gt;.&lt;/p&gt;&lt;div class="oucontent-table oucontent-s-normal oucontent-s-box"&gt;&lt;h3 class="oucontent-h3 oucontent-heading oucontent-nonumber"&gt;Table 1 Podcasts&lt;/h3&gt;&lt;div class="oucontent-table-wrapper"&gt;&lt;table&gt;&lt;tr&gt;&lt;td&gt;Podcast title&lt;/td&gt;&lt;td&gt;Links&lt;/td&gt;&lt;td&gt;Description (from the website)&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Banking Information Security Podcast&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;a class="oucontent-hyperlink" href="http://player.fm/series/banking-information-security-podcast"&gt;Direct&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a class="oucontent-hyperlink" href="http://www.bankinfosecurity.com/itunes_rss_podcasts.php"&gt;iTunes&lt;/a&gt;&lt;/p&gt;&lt;/td&gt;&lt;td&gt;Audio interviews with banking/security leading practitioners and thinkers.&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;BTR: Security with Caleb Barlow | Blog Talk Radio&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;a class="oucontent-hyperlink" href="http://www.blogtalkradio.com/calebbarlow"&gt;Direct&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a class="oucontent-hyperlink" href="http://phobos.apple.com/WebObjects/MZStore.woa/wa/viewPodcast?id=384369562"&gt;iTunes&lt;/a&gt;&lt;/p&gt;&lt;/td&gt;&lt;td&gt;Caleb Barlow, Director of Application, Data and Mobile Security at IBM presents a podcast on the changing landscape of information security, featuring topics for both business executives and security professionals.&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;BrightTALK IT Security Webcast&lt;/td&gt;&lt;td&gt;&lt;a class="oucontent-hyperlink" href="https://www.brighttalk.com/community/it-security/channel/288"&gt;Direct&lt;/a&gt;&lt;/td&gt;&lt;td&gt;Presentations by leading experts in information security. Covers topics such as application, computer, network and internet security, access control management, data privacy and other hot topics.&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;BrightTALK Information Security Community Webcast&lt;/td&gt;&lt;td&gt;&lt;a class="oucontent-hyperlink" href="https://www.brighttalk.com/community/it-security/channel/5418"&gt;Direct&lt;/a&gt;&lt;/td&gt;&lt;td&gt;Primarily concerned with topics such as compliance, encryption, anti-virus, malware, cloud security, data protection, hacking, network security and virtualisation.&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;BrightTALK Governance, Risk and Compliance Webcast&lt;/td&gt;&lt;td&gt;&lt;a class="oucontent-hyperlink" href="https://www.brighttalk.com/community/governance-risk-compliance/channel/188"&gt;Direct&lt;/a&gt;&lt;/td&gt;&lt;td&gt;Presentations by respected commentators in the fields of governance, risk and compliance.&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;CERIAS Security Seminar Podcast&lt;/td&gt;&lt;td&gt;&lt;p&gt;No direct link available&lt;/p&gt;&lt;p&gt;&lt;a class="oucontent-hyperlink" href="https://itunes.apple.com/us/podcast/cerias-security-seminar-podcast/id192801681"&gt;iTunes&lt;/a&gt;&lt;/p&gt;&lt;/td&gt;&lt;td&gt;Purdue faculty and visitors give in-depth presentations on topics in the areas of computer and network security, computer crime investigation, information warfare, information ethics, public policy for computing and security, and the computing &amp;#x2018;underground’.&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;CERT’s Podcast Series: Security for Business Leaders&lt;/td&gt;&lt;td&gt;&lt;p&gt;No direct link available&lt;/p&gt;&lt;p&gt;&lt;a class="oucontent-hyperlink" href="http://www.cert.org/podcast/exec_podcast.rss"&gt;iTunes&lt;/a&gt;&lt;/p&gt;&lt;/td&gt;&lt;td&gt;Both general principles and specific starting points for InfoSec leaders.&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Crypto-Gram Security Podcast&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;a class="oucontent-hyperlink" href="http://dhenage.libsyn.com/"&gt;Direct&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a class="oucontent-hyperlink" href="http://crypto-gram.libsyn.com/rss"&gt;iTunes&lt;/a&gt;&lt;/p&gt;&lt;/td&gt;&lt;td&gt;The Crypto-Gram Newsletter by Bruce Schneier in audio format, read by Dan Henage.&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Data Breach today&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;a class="oucontent-hyperlink" href="http://www.databreachtoday.com/interviews.php"&gt;Direct&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a class="oucontent-hyperlink" href="http://www.databreachtoday.com/itunes_rss_podcasts.php"&gt;iTunes&lt;/a&gt;&lt;/p&gt;&lt;/td&gt;&lt;td&gt;News, research and education on the top industry, security, regulatory and technology challenges facing InfoSec leaders around the globe.&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Eurotrash Security Podcast&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;a class="oucontent-hyperlink" href="http://www.eurotrashsecurity.eu/index.php/Episodes"&gt;Direct&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a class="oucontent-hyperlink" href="http://www.eurotrashsecurity.eu/episodes/eurotrash.xml"&gt;iTunes&lt;/a&gt;&lt;/p&gt;&lt;/td&gt;&lt;td&gt;An InfoSec podcast for the technically inclined with a dedicated European focus.&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Government Information Security Podcast&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;a class="oucontent-hyperlink" href="http://www.govinfosecurity.com/interviews.php"&gt;Direct&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a class="oucontent-hyperlink" href="http://www.govinfosecurity.com/itunes_rss_podcasts.php"&gt;iTunes&lt;/a&gt;&lt;/p&gt;&lt;/td&gt;&lt;td&gt;For public sector security leaders implementing InfoSec in their organisation.&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Healthcare Information Security Podcast&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;a class="oucontent-hyperlink" href="http://www.healthcareinfosecurity.com/interviews.php"&gt;Direct&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a class="oucontent-hyperlink" href="http://www.healthcareinfosecurity.com/itunes_rss_podcasts.php"&gt;iTunes&lt;/a&gt;&lt;/p&gt;&lt;/td&gt;&lt;td&gt;For healthcare security leaders implementing InfoSec in their organisation.&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;InfoRisk Today&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;a class="oucontent-hyperlink" href="http://www.inforisktoday.com/interviews.php"&gt;Direct&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a class="oucontent-hyperlink" href="http://www.inforisktoday.com/itunes_rss_podcasts.php"&gt;iTunes&lt;/a&gt;&lt;/p&gt;&lt;/td&gt;&lt;td&gt;News, opinions, education and other related content to assist senior executives and information security professionals.&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;PaulDotCom Security Weekly&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;a class="oucontent-hyperlink" href="http://pauldotcom.com/"&gt;Direct&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a class="oucontent-hyperlink" href="http://pauldotcom.com/podcast/psw.xml"&gt;iTunes&lt;/a&gt;&lt;/p&gt;&lt;/td&gt;&lt;td&gt;Providing technical analysis and insight in a &amp;#x2018;friendly and entertaining manner’.&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Sans Internet Storm Center Daily&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;a class="oucontent-hyperlink" href="https://isc.sans.edu/"&gt;Direct&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a class="oucontent-hyperlink" href="http://isc.sans.edu/dailypodcast.xml"&gt;iTunes&lt;/a&gt;&lt;/p&gt;&lt;/td&gt;&lt;td&gt;Aimed at developing the information security technology leaders the world needs by providing instruction, research and public service programmes.&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Security Now!&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;a class="oucontent-hyperlink" href="http://www.grc.com/securitynow.htm"&gt;Direct&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a class="oucontent-hyperlink" href="http://leoville.tv/podcasts/sn.xml"&gt;iTunes&lt;/a&gt;&lt;/p&gt;&lt;/td&gt;&lt;td&gt;Focuses on personal computer security.&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Security Wire Weekly&lt;/td&gt;&lt;td&gt;&lt;a class="oucontent-hyperlink" href="http://itknowledgeexchange.techtarget.com/security-wire-weekly/"&gt;Direct&lt;/a&gt;&lt;/td&gt;&lt;td&gt;Timely details about information security threats and vulnerabilities, and their control.&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;The CyberJungle&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;a class="oucontent-hyperlink" href="http://www.thecyberjungle.com/listen.php"&gt;Direct&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a class="oucontent-hyperlink" href="http://dataclonelabs.com/security_talkworkshop/datasecurity.xml"&gt;iTunes&lt;/a&gt;&lt;/p&gt;&lt;/td&gt;&lt;td&gt;News and chat about security, privacy and relevant law.&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;The Malware Report&lt;/td&gt;&lt;td&gt;&lt;p&gt;No direct link available&lt;/p&gt;&lt;p&gt;&lt;a class="oucontent-hyperlink" href="http://www.newworldpodcasting.com/files/feeds/eset/23_feed_itunes.xml"&gt;iTunes&lt;/a&gt;&lt;/p&gt;&lt;/td&gt;&lt;td&gt;Discusses the latest news and information related to internet and computer security, including tips and best practices for keeping users safe.&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
      <guid isPermaLink="true">https://www.open.edu/openlearn/science-maths-technology/information-security/content-section-3.1</guid>
    <dc:title>3.1 Which podcasts and blogs?</dc:title><dc:identifier>M811_1</dc:identifier><dc:description>&lt;p&gt;At the time of writing, the blog &lt;span class="oucontent-linkwithtip"&gt;&lt;a class="oucontent-hyperlink" href="https://wordpress.com/activity/"&gt;WordPress.com&lt;/a&gt;&lt;/span&gt; boasts of having over 400 million people viewing more than 22.3 billion pages each month! According to the Pew Research Center (2012), over 91,000 podcasts were produced in 2011 alone. Finding the most relevant resources from all of these is a difficult task and one that will get more difficult as the number of blogs and podcasts increases.&lt;/p&gt;&lt;p&gt;With a focus on information security, however, the number of relevant web resources comes down to a more manageable number. However, not all podcasts are equal: they vary in content, presentation, sound quality and support (for example, the availability of transcripts, resource lists and other supporting material). For instance:&lt;/p&gt;&lt;ul class="oucontent-bulleted"&gt;&lt;li&gt;Podcasts on InfoSec are generally, but not exclusively, produced in the US.&lt;/li&gt;&lt;li&gt;Podcasts vary greatly in their length, from fewer than ten minutes to an hour or more, and so finding and managing the time to engage with them can be a challenge.&lt;/li&gt;&lt;li&gt;A popular podcast format is an unscripted conversation between experts. Such podcasts can sometimes appear unfocused, containing material only loosely related to the topic and shallow in their coverage. Whether you grow to like this ‘feature’ of a podcast or not is unimportant.&lt;/li&gt;&lt;li&gt;There are a great number of podcasts which contain content related to InfoSec without being dedicated to InfoSec.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Because of this, and because no two students’ capabilities or interests are the same, we suggest a range of podcasts to work with. Feel free to find your own!&lt;/p&gt;&lt;div class="
            oucontent-activity
           oucontent-s-heavybox1 oucontent-s-box "&gt;&lt;div class="oucontent-outer-box"&gt;&lt;h2 class="oucontent-h3 oucontent-heading oucontent-nonumber"&gt;Activity 6: Tracking the leading edge&lt;/h2&gt;&lt;div class="oucontent-inner-box"&gt;&lt;div class="oucontent-saq-question"&gt;&lt;p&gt;Have a quick look at the list of podcasts contained below, and make a note of any web resources that jump out at you as interesting. For example, if you are working within the banking industry you may find that the ‘Banking Industry Security Podcast’ stands out. There are specialist podcasts for Business Leaders, Cyberlaw, Government and Healthcare. Bruce Schneier's Crypto-Gram Security Podcast is also very popular.&lt;/p&gt;&lt;p&gt;After those, listen to at least two more podcasts. If you enjoy them, they can become quite addictive.&lt;/p&gt;&lt;p&gt;The way that you access these web resources is up to you – the lists contain links for (where available) both iTunes and standalone versions of the podcasts.&lt;/p&gt;&lt;p&gt;Instructions for accessing podcasts through iTunes are available in the &lt;a class="oucontent-hyperlink" href="http://www.apple.com/uk/itunes/podcasts"&gt;Podcast section&lt;/a&gt;.&lt;/p&gt;&lt;div class="oucontent-table oucontent-s-normal oucontent-s-box"&gt;&lt;h3 class="oucontent-h3 oucontent-heading oucontent-nonumber"&gt;Table 1 Podcasts&lt;/h3&gt;&lt;div class="oucontent-table-wrapper"&gt;&lt;table&gt;&lt;tr&gt;&lt;td&gt;Podcast title&lt;/td&gt;&lt;td&gt;Links&lt;/td&gt;&lt;td&gt;Description (from the website)&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Banking Information Security Podcast&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;a class="oucontent-hyperlink" href="http://player.fm/series/banking-information-security-podcast"&gt;Direct&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a class="oucontent-hyperlink" href="http://www.bankinfosecurity.com/itunes_rss_podcasts.php"&gt;iTunes&lt;/a&gt;&lt;/p&gt;&lt;/td&gt;&lt;td&gt;Audio interviews with banking/security leading practitioners and thinkers.&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;BTR: Security with Caleb Barlow | Blog Talk Radio&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;a class="oucontent-hyperlink" href="http://www.blogtalkradio.com/calebbarlow"&gt;Direct&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a class="oucontent-hyperlink" href="http://phobos.apple.com/WebObjects/MZStore.woa/wa/viewPodcast?id=384369562"&gt;iTunes&lt;/a&gt;&lt;/p&gt;&lt;/td&gt;&lt;td&gt;Caleb Barlow, Director of Application, Data and Mobile Security at IBM presents a podcast on the changing landscape of information security, featuring topics for both business executives and security professionals.&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;BrightTALK IT Security Webcast&lt;/td&gt;&lt;td&gt;&lt;a class="oucontent-hyperlink" href="https://www.brighttalk.com/community/it-security/channel/288"&gt;Direct&lt;/a&gt;&lt;/td&gt;&lt;td&gt;Presentations by leading experts in information security. Covers topics such as application, computer, network and internet security, access control management, data privacy and other hot topics.&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;BrightTALK Information Security Community Webcast&lt;/td&gt;&lt;td&gt;&lt;a class="oucontent-hyperlink" href="https://www.brighttalk.com/community/it-security/channel/5418"&gt;Direct&lt;/a&gt;&lt;/td&gt;&lt;td&gt;Primarily concerned with topics such as compliance, encryption, anti-virus, malware, cloud security, data protection, hacking, network security and virtualisation.&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;BrightTALK Governance, Risk and Compliance Webcast&lt;/td&gt;&lt;td&gt;&lt;a class="oucontent-hyperlink" href="https://www.brighttalk.com/community/governance-risk-compliance/channel/188"&gt;Direct&lt;/a&gt;&lt;/td&gt;&lt;td&gt;Presentations by respected commentators in the fields of governance, risk and compliance.&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;CERIAS Security Seminar Podcast&lt;/td&gt;&lt;td&gt;&lt;p&gt;No direct link available&lt;/p&gt;&lt;p&gt;&lt;a class="oucontent-hyperlink" href="https://itunes.apple.com/us/podcast/cerias-security-seminar-podcast/id192801681"&gt;iTunes&lt;/a&gt;&lt;/p&gt;&lt;/td&gt;&lt;td&gt;Purdue faculty and visitors give in-depth presentations on topics in the areas of computer and network security, computer crime investigation, information warfare, information ethics, public policy for computing and security, and the computing ‘underground’.&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;CERT’s Podcast Series: Security for Business Leaders&lt;/td&gt;&lt;td&gt;&lt;p&gt;No direct link available&lt;/p&gt;&lt;p&gt;&lt;a class="oucontent-hyperlink" href="http://www.cert.org/podcast/exec_podcast.rss"&gt;iTunes&lt;/a&gt;&lt;/p&gt;&lt;/td&gt;&lt;td&gt;Both general principles and specific starting points for InfoSec leaders.&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Crypto-Gram Security Podcast&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;a class="oucontent-hyperlink" href="http://dhenage.libsyn.com/"&gt;Direct&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a class="oucontent-hyperlink" href="http://crypto-gram.libsyn.com/rss"&gt;iTunes&lt;/a&gt;&lt;/p&gt;&lt;/td&gt;&lt;td&gt;The Crypto-Gram Newsletter by Bruce Schneier in audio format, read by Dan Henage.&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Data Breach today&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;a class="oucontent-hyperlink" href="http://www.databreachtoday.com/interviews.php"&gt;Direct&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a class="oucontent-hyperlink" href="http://www.databreachtoday.com/itunes_rss_podcasts.php"&gt;iTunes&lt;/a&gt;&lt;/p&gt;&lt;/td&gt;&lt;td&gt;News, research and education on the top industry, security, regulatory and technology challenges facing InfoSec leaders around the globe.&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Eurotrash Security Podcast&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;a class="oucontent-hyperlink" href="http://www.eurotrashsecurity.eu/index.php/Episodes"&gt;Direct&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a class="oucontent-hyperlink" href="http://www.eurotrashsecurity.eu/episodes/eurotrash.xml"&gt;iTunes&lt;/a&gt;&lt;/p&gt;&lt;/td&gt;&lt;td&gt;An InfoSec podcast for the technically inclined with a dedicated European focus.&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Government Information Security Podcast&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;a class="oucontent-hyperlink" href="http://www.govinfosecurity.com/interviews.php"&gt;Direct&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a class="oucontent-hyperlink" href="http://www.govinfosecurity.com/itunes_rss_podcasts.php"&gt;iTunes&lt;/a&gt;&lt;/p&gt;&lt;/td&gt;&lt;td&gt;For public sector security leaders implementing InfoSec in their organisation.&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Healthcare Information Security Podcast&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;a class="oucontent-hyperlink" href="http://www.healthcareinfosecurity.com/interviews.php"&gt;Direct&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a class="oucontent-hyperlink" href="http://www.healthcareinfosecurity.com/itunes_rss_podcasts.php"&gt;iTunes&lt;/a&gt;&lt;/p&gt;&lt;/td&gt;&lt;td&gt;For healthcare security leaders implementing InfoSec in their organisation.&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;InfoRisk Today&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;a class="oucontent-hyperlink" href="http://www.inforisktoday.com/interviews.php"&gt;Direct&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a class="oucontent-hyperlink" href="http://www.inforisktoday.com/itunes_rss_podcasts.php"&gt;iTunes&lt;/a&gt;&lt;/p&gt;&lt;/td&gt;&lt;td&gt;News, opinions, education and other related content to assist senior executives and information security professionals.&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;PaulDotCom Security Weekly&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;a class="oucontent-hyperlink" href="http://pauldotcom.com/"&gt;Direct&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a class="oucontent-hyperlink" href="http://pauldotcom.com/podcast/psw.xml"&gt;iTunes&lt;/a&gt;&lt;/p&gt;&lt;/td&gt;&lt;td&gt;Providing technical analysis and insight in a ‘friendly and entertaining manner’.&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Sans Internet Storm Center Daily&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;a class="oucontent-hyperlink" href="https://isc.sans.edu/"&gt;Direct&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a class="oucontent-hyperlink" href="http://isc.sans.edu/dailypodcast.xml"&gt;iTunes&lt;/a&gt;&lt;/p&gt;&lt;/td&gt;&lt;td&gt;Aimed at developing the information security technology leaders the world needs by providing instruction, research and public service programmes.&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Security Now!&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;a class="oucontent-hyperlink" href="http://www.grc.com/securitynow.htm"&gt;Direct&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a class="oucontent-hyperlink" href="http://leoville.tv/podcasts/sn.xml"&gt;iTunes&lt;/a&gt;&lt;/p&gt;&lt;/td&gt;&lt;td&gt;Focuses on personal computer security.&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Security Wire Weekly&lt;/td&gt;&lt;td&gt;&lt;a class="oucontent-hyperlink" href="http://itknowledgeexchange.techtarget.com/security-wire-weekly/"&gt;Direct&lt;/a&gt;&lt;/td&gt;&lt;td&gt;Timely details about information security threats and vulnerabilities, and their control.&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;The CyberJungle&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;a class="oucontent-hyperlink" href="http://www.thecyberjungle.com/listen.php"&gt;Direct&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a class="oucontent-hyperlink" href="http://dataclonelabs.com/security_talkworkshop/datasecurity.xml"&gt;iTunes&lt;/a&gt;&lt;/p&gt;&lt;/td&gt;&lt;td&gt;News and chat about security, privacy and relevant law.&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;The Malware Report&lt;/td&gt;&lt;td&gt;&lt;p&gt;No direct link available&lt;/p&gt;&lt;p&gt;&lt;a class="oucontent-hyperlink" href="http://www.newworldpodcasting.com/files/feeds/eset/23_feed_itunes.xml"&gt;iTunes&lt;/a&gt;&lt;/p&gt;&lt;/td&gt;&lt;td&gt;Discusses the latest news and information related to internet and computer security, including tips and best practices for keeping users safe.&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</dc:description><dc:publisher>The Open University</dc:publisher><dc:creator>The Open University</dc:creator><dc:type>Course</dc:type><dc:format>text/html</dc:format><dc:language>en-GB</dc:language><dc:source>Information security - M811_1</dc:source><cc:license>Copyright © 2016 The Open University</cc:license></item>
    <item>
      <title>4 Conclusion</title>
      <link>https://www.open.edu/openlearn/science-maths-technology/information-security/content-section-4</link>
      <pubDate>Thu, 23 Jun 2016 10:43:46 GMT</pubDate>
      <description>&lt;p&gt;This OpenLearn course, &lt;i&gt;Information security&lt;/i&gt;, has given you a brief introduction to the value of information within modern organisations. Organisations need to protect the value of their information, and this means being able to balance Confidentiality, Integrity and Availability: the CIA Triad. Getting this right motivates the subject of information security.&lt;/p&gt;</description>
      <guid isPermaLink="true">https://www.open.edu/openlearn/science-maths-technology/information-security/content-section-4</guid>
    <dc:title>4 Conclusion</dc:title><dc:identifier>M811_1</dc:identifier><dc:description>&lt;p&gt;This OpenLearn course, &lt;i&gt;Information security&lt;/i&gt;, has given you a brief introduction to the value of information within modern organisations. Organisations need to protect the value of their information, and this means being able to balance Confidentiality, Integrity and Availability: the CIA Triad. Getting this right motivates the subject of information security.&lt;/p&gt;</dc:description><dc:publisher>The Open University</dc:publisher><dc:creator>The Open University</dc:creator><dc:type>Course</dc:type><dc:format>text/html</dc:format><dc:language>en-GB</dc:language><dc:source>Information security - M811_1</dc:source><cc:license>Copyright © 2016 The Open University</cc:license></item>
    <item>
      <title>Keep on learning</title>
      <link>https://www.open.edu/openlearn/science-maths-technology/information-security/content-section-5</link>
      <pubDate>Thu, 23 Jun 2016 10:43:46 GMT</pubDate>
      <description>&lt;div class="oucontent-figure oucontent-media-mini"&gt;&lt;img src="https://www.open.edu/openlearn/ocw/pluginfile.php/702359/mod_oucontent/oucontent/34834/1b9129f0/d3c986e6/ol_skeleton_keeponlearning_image.jpg" alt="" width="300" height="200" style="max-width:300px;" class="oucontent-figure-image"/&gt;&lt;/div&gt;&lt;p&gt;&amp;#x2003;&lt;/p&gt;&lt;div class="oucontent-internalsection"&gt;&lt;h2 class="oucontent-h2 oucontent-internalsection-head"&gt;Study another free course&lt;/h2&gt;&lt;p&gt;There are more than&amp;#xA0;&lt;b&gt;800 courses&amp;#xA0;on OpenLearn&lt;/b&gt;&amp;#xA0;for you to choose from on a range of subjects.&amp;#xA0;&lt;/p&gt;&lt;p&gt;Find out more about all our &lt;span class="oucontent-linkwithtip"&gt;&lt;a class="oucontent-hyperlink" href="http://www.open.edu/openlearn/free-courses?utm_source=openlearn&amp;amp;utm_campaign=ol&amp;amp;utm_medium=ebook"&gt;free courses&lt;/a&gt;&lt;/span&gt;.&lt;/p&gt;&lt;p&gt;&amp;#x2003;&lt;/p&gt;&lt;/div&gt;&lt;div class="oucontent-internalsection"&gt;&lt;h2 class="oucontent-h2 oucontent-internalsection-head"&gt;Take your studies further&lt;/h2&gt;&lt;p&gt;Find out more about studying with The Open University by&amp;#xA0;&lt;a class="oucontent-hyperlink" href="http://www.open.ac.uk/courses?utm_source=openlearn&amp;amp;utm_campaign=ou&amp;amp;utm_medium=ebook"&gt;visiting our online prospectus&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;If you are new to university study, you may be interested in our &lt;a class="oucontent-hyperlink" href=" http://www.open.ac.uk/courses/do-it/access?utm_source=openlearn&amp;amp;utm_campaign=ou&amp;amp;utm_medium=ebook"&gt;Access Courses&lt;/a&gt; or &lt;a class="oucontent-hyperlink" href=" http://www.open.ac.uk/courses/certificates-he?utm_source=openlearn&amp;amp;utm_campaign=ou&amp;amp;utm_medium=ebook"&gt;Certificates&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;&amp;#x2003;&lt;/p&gt;&lt;/div&gt;&lt;div class="oucontent-internalsection"&gt;&lt;h2 class="oucontent-h2 oucontent-internalsection-head"&gt;What’s new from OpenLearn?&lt;/h2&gt;&lt;p&gt;&lt;a class="oucontent-hyperlink" href="http://www.open.edu/openlearn/about-openlearn/subscribe-the-openlearn-newsletter?utm_source=openlearn&amp;amp;utm_campaign=ol&amp;amp;utm_medium=ebook"&gt;Sign up to our newsletter&lt;/a&gt; or view a sample.&lt;/p&gt;&lt;p&gt;&amp;#x2003;&lt;/p&gt;&lt;/div&gt;&lt;div class="oucontent-box oucontent-s-hollowbox2 oucontent-s-box &amp;#10;        oucontent-s-noheading&amp;#10;      "&gt;&lt;div class="oucontent-outer-box"&gt;&lt;div class="oucontent-inner-box"&gt;&lt;p&gt;For reference, full URLs to pages listed above:&lt;/p&gt;&lt;p&gt;OpenLearn&amp;#xA0;–&amp;#xA0;&lt;a class="oucontent-hyperlink" href="http://www.open.edu/openlearn/free-courses?utm_source=openlearn&amp;amp;utm_campaign=ol&amp;amp;utm_medium=ebook"&gt;www.open.edu/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;openlearn/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;free-courses&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Visiting our online prospectus&amp;#xA0;–&amp;#xA0;&lt;a class="oucontent-hyperlink" href="http://www.open.ac.uk/courses?utm_source=openlearn&amp;amp;utm_campaign=ou&amp;amp;utm_medium=ebook"&gt;www.open.ac.uk/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;courses&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Access Courses&amp;#xA0;–&amp;#xA0;&lt;a class="oucontent-hyperlink" href=" http://www.open.ac.uk/courses/do-it/access?utm_source=openlearn&amp;amp;utm_campaign=ou&amp;amp;utm_medium=ebook"&gt;www.open.ac.uk/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;courses/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;do-it/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;access&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Certificates&amp;#xA0;–&amp;#xA0;&lt;a class="oucontent-hyperlink" href=" http://www.open.ac.uk/courses/certificates-he?utm_source=openlearn&amp;amp;utm_campaign=ou&amp;amp;utm_medium=ebook"&gt;www.open.ac.uk/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;courses/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;certificates-he&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Newsletter &amp;#xAD;– &lt;a class="oucontent-hyperlink" href=" http://www.open.edu/openlearn/about-openlearn/subscribe-the-openlearn-newsletter?utm_source=openlearn&amp;amp;utm_campaign=ol&amp;amp;utm_medium=ebook"&gt;www.open.edu/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;openlearn/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;about-openlearn/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;subscribe-the-openlearn-newsletter&lt;/a&gt;&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
      <guid isPermaLink="true">https://www.open.edu/openlearn/science-maths-technology/information-security/content-section-5</guid>
    <dc:title>Keep on learning</dc:title><dc:identifier>M811_1</dc:identifier><dc:description>&lt;div class="oucontent-figure oucontent-media-mini"&gt;&lt;img src="https://www.open.edu/openlearn/ocw/pluginfile.php/702359/mod_oucontent/oucontent/34834/1b9129f0/d3c986e6/ol_skeleton_keeponlearning_image.jpg" alt="" width="300" height="200" style="max-width:300px;" class="oucontent-figure-image"/&gt;&lt;/div&gt;&lt;p&gt; &lt;/p&gt;&lt;div class="oucontent-internalsection"&gt;&lt;h2 class="oucontent-h2 oucontent-internalsection-head"&gt;Study another free course&lt;/h2&gt;&lt;p&gt;There are more than &lt;b&gt;800 courses on OpenLearn&lt;/b&gt; for you to choose from on a range of subjects. &lt;/p&gt;&lt;p&gt;Find out more about all our &lt;span class="oucontent-linkwithtip"&gt;&lt;a class="oucontent-hyperlink" href="http://www.open.edu/openlearn/free-courses?utm_source=openlearn&amp;utm_campaign=ol&amp;utm_medium=ebook"&gt;free courses&lt;/a&gt;&lt;/span&gt;.&lt;/p&gt;&lt;p&gt; &lt;/p&gt;&lt;/div&gt;&lt;div class="oucontent-internalsection"&gt;&lt;h2 class="oucontent-h2 oucontent-internalsection-head"&gt;Take your studies further&lt;/h2&gt;&lt;p&gt;Find out more about studying with The Open University by &lt;a class="oucontent-hyperlink" href="http://www.open.ac.uk/courses?utm_source=openlearn&amp;utm_campaign=ou&amp;utm_medium=ebook"&gt;visiting our online prospectus&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;If you are new to university study, you may be interested in our &lt;a class="oucontent-hyperlink" href=" http://www.open.ac.uk/courses/do-it/access?utm_source=openlearn&amp;utm_campaign=ou&amp;utm_medium=ebook"&gt;Access Courses&lt;/a&gt; or &lt;a class="oucontent-hyperlink" href=" http://www.open.ac.uk/courses/certificates-he?utm_source=openlearn&amp;utm_campaign=ou&amp;utm_medium=ebook"&gt;Certificates&lt;/a&gt;.&lt;/p&gt;&lt;p&gt; &lt;/p&gt;&lt;/div&gt;&lt;div class="oucontent-internalsection"&gt;&lt;h2 class="oucontent-h2 oucontent-internalsection-head"&gt;What’s new from OpenLearn?&lt;/h2&gt;&lt;p&gt;&lt;a class="oucontent-hyperlink" href="http://www.open.edu/openlearn/about-openlearn/subscribe-the-openlearn-newsletter?utm_source=openlearn&amp;utm_campaign=ol&amp;utm_medium=ebook"&gt;Sign up to our newsletter&lt;/a&gt; or view a sample.&lt;/p&gt;&lt;p&gt; &lt;/p&gt;&lt;/div&gt;&lt;div class="oucontent-box oucontent-s-hollowbox2 oucontent-s-box 
        oucontent-s-noheading
      "&gt;&lt;div class="oucontent-outer-box"&gt;&lt;div class="oucontent-inner-box"&gt;&lt;p&gt;For reference, full URLs to pages listed above:&lt;/p&gt;&lt;p&gt;OpenLearn – &lt;a class="oucontent-hyperlink" href="http://www.open.edu/openlearn/free-courses?utm_source=openlearn&amp;utm_campaign=ol&amp;utm_medium=ebook"&gt;www.open.edu/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;openlearn/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;free-courses&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Visiting our online prospectus – &lt;a class="oucontent-hyperlink" href="http://www.open.ac.uk/courses?utm_source=openlearn&amp;utm_campaign=ou&amp;utm_medium=ebook"&gt;www.open.ac.uk/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;courses&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Access Courses – &lt;a class="oucontent-hyperlink" href=" http://www.open.ac.uk/courses/do-it/access?utm_source=openlearn&amp;utm_campaign=ou&amp;utm_medium=ebook"&gt;www.open.ac.uk/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;courses/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;do-it/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;access&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Certificates – &lt;a class="oucontent-hyperlink" href=" http://www.open.ac.uk/courses/certificates-he?utm_source=openlearn&amp;utm_campaign=ou&amp;utm_medium=ebook"&gt;www.open.ac.uk/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;courses/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;certificates-he&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Newsletter ­– &lt;a class="oucontent-hyperlink" href=" http://www.open.edu/openlearn/about-openlearn/subscribe-the-openlearn-newsletter?utm_source=openlearn&amp;utm_campaign=ol&amp;utm_medium=ebook"&gt;www.open.edu/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;openlearn/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;about-openlearn/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;subscribe-the-openlearn-newsletter&lt;/a&gt;&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</dc:description><dc:publisher>The Open University</dc:publisher><dc:creator>The Open University</dc:creator><dc:type>Course</dc:type><dc:format>text/html</dc:format><dc:language>en-GB</dc:language><dc:source>Information security - M811_1</dc:source><cc:license>Copyright © 2016 The Open University</cc:license></item>
    <item>
      <title>References</title>
      <link>https://www.open.edu/openlearn/science-maths-technology/information-security/content-section---references</link>
      <pubDate>Thu, 23 Jun 2016 10:43:46 GMT</pubDate>
      <description>&lt;div class="oucontent-referenceitem"&gt;Amerding, T (2012) &amp;#x2018;The 15 worst data security breaches of the 21st Century’, &lt;i&gt;CSO&lt;/i&gt;, 15 February [Online]. Available at &lt;span class="oucontent-linkwithtip"&gt;&lt;a class="oucontent-hyperlink" href="http://www.csoonline.com/article/2130877/data-protection/data-protection-the-15-worst-data-security-breaches-of-the-21st-century.html"&gt;www.csoonline.com/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;article/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;2130877/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;data-protection/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;data-protection-the-15-worst-data-security-breaches-of-the-21st-century.html&lt;/a&gt;&lt;/span&gt; (Accessed 4 June 2016).&lt;/div&gt;&lt;div class="oucontent-referenceitem"&gt;Hunt, T. (2016) &lt;i&gt;have I been pwned&lt;/i&gt; [Online]. Available at &lt;a class="oucontent-hyperlink" href="https://haveibeenpwned.com"&gt;https://haveibeenpwned.com&lt;/a&gt; (Accessed 7 June 2016).&lt;/div&gt;&lt;div class="oucontent-referenceitem"&gt;Itami, H. and Roehl, T. (1987) Mobilizing Invisible Assets, Harvard, Harvard University Press.&lt;/div&gt;&lt;div class="oucontent-referenceitem"&gt;Pew Research Center (2012) &lt;i&gt;The State of the News Media 2012 – Audio: By the Numbers&lt;/i&gt; [Online]. Available at &lt;a class="oucontent-hyperlink" href="http://stateofthemedia.org/2012/audio-how-far-will-digital-go/audio-by-the-numbers/"&gt;http://stateofthemedia.org/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;2012/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;audio-how-far-will-digital-go/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;audio-by-the-numbers/&lt;/a&gt; (Accessed 4 June 2016).&lt;/div&gt;&lt;div class="oucontent-referenceitem"&gt;Protalinski, E. (2013) &amp;#x2018;Belgian rail firm SNCB Europe sees 1.5m customer details leaked, but fails to take responsibility’, &lt;i&gt;The Next Web&lt;/i&gt;, [Online]. Available at &lt;a class="oucontent-hyperlink" href="http://thenextweb.com/insider/2012/12/24/belgian-rail-firm-sncb-europe-sees-1-5m-customer-details-leaked-but-fails-to-take-responsibility/"&gt;http://thenextweb.com/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;insider/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;2012/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;12/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;24/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;belgian-rail-firm-sncb-europe-sees-1-5m-customer-details-leaked-but-fails-to-take-responsibility/&lt;/a&gt; (Accessed 4 June 2016).&lt;/div&gt;&lt;div class="oucontent-referenceitem"&gt;Wikipedia (2016a) &lt;i&gt;Coca-Cola Formula &lt;/i&gt;[Online], 31 May 2016. Available at &lt;a class="oucontent-hyperlink" href="https://en.wikipedia.org/wiki/Coca-Cola_formula#Pemberton_recipe "&gt;https://en.wikipedia.org/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;wiki/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;Coca-Cola_formula#Pemberton_recipe &lt;/a&gt;(Accessed 4 June 2016).&lt;/div&gt;&lt;div class="oucontent-referenceitem"&gt;Wikipedia (2016b) &lt;i&gt;Stuxnet&lt;/i&gt; [Online], 2 June 2016. Available at &lt;a class="oucontent-hyperlink" href="http://en.wikipedia.org/wiki/E-commerce"&gt;http://en.wikipedia.org/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;wiki/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;E-commerce&lt;/a&gt; (Accessed 1 June 2015).&lt;/div&gt;&lt;div class="oucontent-referenceitem"&gt;Wolfram Alpha computational knowledge engine (Wolfram Alpha) (2016a) [Online]. Available at &lt;a class="oucontent-hyperlink" href="http://www.wolframalpha.com/input/?i=market+value+and+book+value+coca-cola"&gt;http://www.wolframalpha.com/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;input/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;?i=market+value+and+book+value+coca-cola&lt;/a&gt; (Accessed 12 May 2016).&lt;/div&gt;&lt;div class="oucontent-referenceitem"&gt;Wolfram Alpha computational knowledge engine (Wolfram Alpha) (2016b) [Online]. Available at &lt;a class="oucontent-hyperlink" href="http://www.wolframalpha.com/input/?i=market+value+and+book+value+facebook"&gt;http://www.wolframalpha.com/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;input/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;?i=market+value+and+book+value+facebook&lt;/a&gt; (Accessed 12 May 2016).&lt;/div&gt;&lt;div class="oucontent-referenceitem"&gt;WordPress (2013) &lt;i&gt;Stats – Wordpress.com&lt;/i&gt; [Online]. Available at &lt;a class="oucontent-hyperlink" href="https://wordpress.com/activity/"&gt;https://wordpress.com/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;activity/&lt;/a&gt; (Accessed 27 September 2013).&lt;/div&gt;</description>
      <guid isPermaLink="true">https://www.open.edu/openlearn/science-maths-technology/information-security/content-section---references</guid>
    <dc:title>References</dc:title><dc:identifier>M811_1</dc:identifier><dc:description>&lt;div class="oucontent-referenceitem"&gt;Amerding, T (2012) ‘The 15 worst data security breaches of the 21st Century’, &lt;i&gt;CSO&lt;/i&gt;, 15 February [Online]. Available at &lt;span class="oucontent-linkwithtip"&gt;&lt;a class="oucontent-hyperlink" href="http://www.csoonline.com/article/2130877/data-protection/data-protection-the-15-worst-data-security-breaches-of-the-21st-century.html"&gt;www.csoonline.com/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;article/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;2130877/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;data-protection/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;data-protection-the-15-worst-data-security-breaches-of-the-21st-century.html&lt;/a&gt;&lt;/span&gt; (Accessed 4 June 2016).&lt;/div&gt;&lt;div class="oucontent-referenceitem"&gt;Hunt, T. (2016) &lt;i&gt;have I been pwned&lt;/i&gt; [Online]. Available at &lt;a class="oucontent-hyperlink" href="https://haveibeenpwned.com"&gt;https://haveibeenpwned.com&lt;/a&gt; (Accessed 7 June 2016).&lt;/div&gt;&lt;div class="oucontent-referenceitem"&gt;Itami, H. and Roehl, T. (1987) Mobilizing Invisible Assets, Harvard, Harvard University Press.&lt;/div&gt;&lt;div class="oucontent-referenceitem"&gt;Pew Research Center (2012) &lt;i&gt;The State of the News Media 2012 – Audio: By the Numbers&lt;/i&gt; [Online]. Available at &lt;a class="oucontent-hyperlink" href="http://stateofthemedia.org/2012/audio-how-far-will-digital-go/audio-by-the-numbers/"&gt;http://stateofthemedia.org/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;2012/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;audio-how-far-will-digital-go/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;audio-by-the-numbers/&lt;/a&gt; (Accessed 4 June 2016).&lt;/div&gt;&lt;div class="oucontent-referenceitem"&gt;Protalinski, E. (2013) ‘Belgian rail firm SNCB Europe sees 1.5m customer details leaked, but fails to take responsibility’, &lt;i&gt;The Next Web&lt;/i&gt;, [Online]. Available at &lt;a class="oucontent-hyperlink" href="http://thenextweb.com/insider/2012/12/24/belgian-rail-firm-sncb-europe-sees-1-5m-customer-details-leaked-but-fails-to-take-responsibility/"&gt;http://thenextweb.com/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;insider/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;2012/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;12/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;24/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;belgian-rail-firm-sncb-europe-sees-1-5m-customer-details-leaked-but-fails-to-take-responsibility/&lt;/a&gt; (Accessed 4 June 2016).&lt;/div&gt;&lt;div class="oucontent-referenceitem"&gt;Wikipedia (2016a) &lt;i&gt;Coca-Cola Formula &lt;/i&gt;[Online], 31 May 2016. Available at &lt;a class="oucontent-hyperlink" href="https://en.wikipedia.org/wiki/Coca-Cola_formula#Pemberton_recipe "&gt;https://en.wikipedia.org/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;wiki/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;Coca-Cola_formula#Pemberton_recipe &lt;/a&gt;(Accessed 4 June 2016).&lt;/div&gt;&lt;div class="oucontent-referenceitem"&gt;Wikipedia (2016b) &lt;i&gt;Stuxnet&lt;/i&gt; [Online], 2 June 2016. Available at &lt;a class="oucontent-hyperlink" href="http://en.wikipedia.org/wiki/E-commerce"&gt;http://en.wikipedia.org/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;wiki/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;E-commerce&lt;/a&gt; (Accessed 1 June 2015).&lt;/div&gt;&lt;div class="oucontent-referenceitem"&gt;Wolfram Alpha computational knowledge engine (Wolfram Alpha) (2016a) [Online]. Available at &lt;a class="oucontent-hyperlink" href="http://www.wolframalpha.com/input/?i=market+value+and+book+value+coca-cola"&gt;http://www.wolframalpha.com/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;input/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;?i=market+value+and+book+value+coca-cola&lt;/a&gt; (Accessed 12 May 2016).&lt;/div&gt;&lt;div class="oucontent-referenceitem"&gt;Wolfram Alpha computational knowledge engine (Wolfram Alpha) (2016b) [Online]. Available at &lt;a class="oucontent-hyperlink" href="http://www.wolframalpha.com/input/?i=market+value+and+book+value+facebook"&gt;http://www.wolframalpha.com/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;input/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;?i=market+value+and+book+value+facebook&lt;/a&gt; (Accessed 12 May 2016).&lt;/div&gt;&lt;div class="oucontent-referenceitem"&gt;WordPress (2013) &lt;i&gt;Stats – Wordpress.com&lt;/i&gt; [Online]. Available at &lt;a class="oucontent-hyperlink" href="https://wordpress.com/activity/"&gt;https://wordpress.com/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;activity/&lt;/a&gt; (Accessed 27 September 2013).&lt;/div&gt;</dc:description><dc:publisher>The Open University</dc:publisher><dc:creator>The Open University</dc:creator><dc:type>Course</dc:type><dc:format>text/html</dc:format><dc:language>en-GB</dc:language><dc:source>Information security - M811_1</dc:source><cc:license>Copyright © 2016 The Open University</cc:license></item>
    <item>
      <title>Acknowledgements</title>
      <link>https://www.open.edu/openlearn/science-maths-technology/information-security/content-section---acknowledgements</link>
      <pubDate>Thu, 23 Jun 2016 10:43:46 GMT</pubDate>
      <description>&lt;p&gt;This free course was written by Jon Hall.&lt;/p&gt;&lt;p&gt;Except for third party materials and otherwise stated (see &lt;span class="oucontent-linkwithtip"&gt;&lt;a class="oucontent-hyperlink" href="http://www.open.ac.uk/conditions"&gt;terms and conditions&lt;/a&gt;&lt;/span&gt;), this content is made available under a &lt;a class="oucontent-hyperlink" href="http://creativecommons.org/licenses/by-nc-sa/4.0/deed.en_GB"&gt;Creative Commons Attribution-NonCommercial-ShareAlike 4.0 Licence&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;The material acknowledged below is Proprietary and used under licence (not subject to Creative Commons Licence). Grateful acknowledgement is made to the following sources for permission to reproduce material in this free course:&lt;/p&gt;&lt;p&gt;Every effort has been made to contact copyright owners. If any have been inadvertently overlooked, the publishers will be pleased to make the necessary arrangements at the first opportunity.&lt;/p&gt;&lt;p&gt;Course image &amp;#xA9; ISAF Public Affairs &lt;a class="oucontent-hyperlink" href="https://creativecommons.org/licenses/by/2.0/"&gt;https://creativecommons.org/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;licenses/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;by/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;2.0/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Figure 1 Steve Back/Rex Features&lt;/p&gt;&lt;p/&gt;&lt;p&gt;&lt;b&gt;Don't miss out&lt;/b&gt;&lt;/p&gt;&lt;p&gt;If reading this text has inspired you to learn more, you may be interested in joining the millions of people who discover our free learning resources and qualifications by visiting The Open University – &lt;a class="oucontent-hyperlink" href="http://www.open.edu/openlearn/free-courses?utm_source=openlearn&amp;amp;utm_campaign=ol&amp;amp;utm_medium=ebook"&gt;www.open.edu/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;openlearn/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;free-courses&lt;/a&gt;.&lt;/p&gt;</description>
      <guid isPermaLink="true">https://www.open.edu/openlearn/science-maths-technology/information-security/content-section---acknowledgements</guid>
    <dc:title>Acknowledgements</dc:title><dc:identifier>M811_1</dc:identifier><dc:description>&lt;p&gt;This free course was written by Jon Hall.&lt;/p&gt;&lt;p&gt;Except for third party materials and otherwise stated (see &lt;span class="oucontent-linkwithtip"&gt;&lt;a class="oucontent-hyperlink" href="http://www.open.ac.uk/conditions"&gt;terms and conditions&lt;/a&gt;&lt;/span&gt;), this content is made available under a &lt;a class="oucontent-hyperlink" href="http://creativecommons.org/licenses/by-nc-sa/4.0/deed.en_GB"&gt;Creative Commons Attribution-NonCommercial-ShareAlike 4.0 Licence&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;The material acknowledged below is Proprietary and used under licence (not subject to Creative Commons Licence). Grateful acknowledgement is made to the following sources for permission to reproduce material in this free course:&lt;/p&gt;&lt;p&gt;Every effort has been made to contact copyright owners. If any have been inadvertently overlooked, the publishers will be pleased to make the necessary arrangements at the first opportunity.&lt;/p&gt;&lt;p&gt;Course image © ISAF Public Affairs &lt;a class="oucontent-hyperlink" href="https://creativecommons.org/licenses/by/2.0/"&gt;https://creativecommons.org/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;licenses/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;by/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;2.0/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Figure 1 Steve Back/Rex Features&lt;/p&gt;&lt;p/&gt;&lt;p&gt;&lt;b&gt;Don't miss out&lt;/b&gt;&lt;/p&gt;&lt;p&gt;If reading this text has inspired you to learn more, you may be interested in joining the millions of people who discover our free learning resources and qualifications by visiting The Open University – &lt;a class="oucontent-hyperlink" href="http://www.open.edu/openlearn/free-courses?utm_source=openlearn&amp;utm_campaign=ol&amp;utm_medium=ebook"&gt;www.open.edu/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;openlearn/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;free-courses&lt;/a&gt;.&lt;/p&gt;</dc:description><dc:publisher>The Open University</dc:publisher><dc:creator>The Open University</dc:creator><dc:type>Course</dc:type><dc:format>text/html</dc:format><dc:language>en-GB</dc:language><dc:source>Information security - M811_1</dc:source><cc:license>Copyright © 2016 The Open University</cc:license></item>
  </channel>
</rss>
