Volume 7, Number 75 July 13, 2009
|
|
|
- Darrell Watts
- 10 years ago
- Views:
Transcription
1 Volume 7, Number 75 July 13, 2009 In this issue: Answering the Need for Information Assurance Graduates: A Case Study of Pennsylvania State University s Security and Risk Analysis Major Robert L. Marchant The Pennsylvania State University University Park, PA USA Robert Cole The Pennsylvania State University University Park, PA USA Chao-Hsien Chu The Pennsylvania State University University Park, PA USA Abstract: This paper is a case study of the Security and Risk Analysis Major at the College of Information Sciences and Technology (IST) at Pennsylvania State University. Fielded in the fall of 2006, the Security and Risk Analysis Major addresses government and industry needs for graduates better prepared for Information Assurance careers through a unique socio technical curriculum. The program is the result of a thorough review of existing academic programs, published industry needs analyses, guidance from the federal government and recommendation from an advisory board created specifically for this program. The objectives of the major go beyond simply providing the theoretical framework and skill sets needed for a career in security and related analyses by providing exposure through problem based learning to current, real life challenges and problems. The pedagogy of the major is based on lecture, web-based learning, industry-endorsed case studies, term projects and industry-sponsored practice. Keywords: information assurance, pedagogy, security, risk analysis, case study Recommended Citation: Marchant, Cole, and Chu (2009). Answering the Need for Information Assurance Graduates: A Case Study of Pennsylvania State University s Security and Risk Analysis Major. Information Systems Education Journal, 7 (75). ISSN: X. (A preliminary version appears in The Proceedings of ISECON 2007: ISSN: ) This issue is on the Internet at
2 ISEDJ 7 (75) Information Systems Education Journal 2 The Information Systems Education Journal (ISEDJ) is a peer-reviewed academic journal published by the Education Special Interest Group (EDSIG) of the Association of Information Technology Professionals (AITP, Chicago, Illinois). ISSN: X. First issue: 8 Sep Title: Information Systems Education Journal. Variants: IS Education Journal; ISEDJ. Physical format: online. Publishing frequency: irregular; as each article is approved, it is published immediately and constitutes a complete separate issue of the current volume. Single issue price: free. Subscription address: [email protected]. Subscription price: free. Electronic access: Contact person: Don Colton ([email protected]) 2009 AITP Education Special Interest Group Board of Directors Don Colton Brigham Young Univ Hawaii EDSIG President Kathleen M. Kelm Edgewood College Treasurer 2009 Thomas N. Janicki Univ NC Wilmington EDSIG President 2009 Wendy Ceccucci Quinnipiac Univ Secretary 2009 Kenneth A. Grant Ryerson University Vice President 2009 Alan R. Peslak Penn State Membership 2009 CONISAR Chair 2009 Steve Reames Angelo State Univ Director Michael A. Smith High Point Director 2009 George S. Nezlek Grand Valley State Director Patricia Sendall Merrimack College Director Li-Jen Shannon Sam Houston State Director Albert L. Harris Appalachian St JISE Editor Paul M. Leidig Grand Valley State University ISECON Chair 2009 Information Systems Education Journal Editors Don Colton Brigham Young University Hawaii Editor Thomas N. Janicki Univ of North Carolina Wilmington Associate Editor Information Systems Education Journal Editorial Review Board Sharen Bakke, Cleveland St Alan T. Burns, DePaul Univ Wendy Ceccucci, Quinnipiac U Janet Helwig, Dominican Univ Scott Hunsinger, Appalachian Kamal Kakish, Lawrence Tech Sam Lee, Texas State Univ Paul Leidig, Grand Valley St Terri L. Lenox, Westminster Anene L. Nnolim, Lawrence Tech Alan R. Peslak, Penn State Doncho Petkov, E Connecticut James Pomykalski, Susquehanna Steve Reames, Angelo State Samuel Sambasivam, Azusa Pac Bruce M. Saulnier, Quinnipiac Patricia Sendall, Merrimack C Li-Jen Shannon, Sam Houston St Michael A. Smith, High Point U Robert Sweeney, South Alabama Stuart A. Varden, Pace Univ Judith Vogel, Richard Stockton Bruce A. White, Quinnipiac Univ Belle S. Woodward, S Illinois U Charles Woratschek, Robert Morris Peter Y. Wu, Robert Morris Univ EDSIG activities include the publication of ISEDJ and JISAR, the organization and execution of the annual ISECON and CONISAR conferences held each fall, the publication of the Journal of Information Systems Education (JISE), and the designation and honoring of an IS Educator of the Year. The Foundation for Information Technology Education has been the key sponsor of ISECON over the years. The Association for Information Technology Professionals (AITP) provides the corporate umbrella under which EDSIG operates. c Copyright 2009 EDSIG. In the spirit of academic freedom, permission is granted to make and distribute unlimited copies of this issue in its PDF or printed form, so long as the entire document is presented, and it is not modified in any substantial way.
3 ISEDJ 7 (75) Marchant, Cole, and Chu 3 Answering the Need for Information Assurance Graduates: A Case Study of Pennsylvania State University s Security and Risk Analysis Major Robert L. Marchant [email protected] Robert Cole [email protected] Chao-Hsien Chu [email protected] College of Information Sciences and Technology The Pennsylvania State University University Park, PA USA Abstract This paper is a case study of the Security and Risk Analysis Major at the College of Information Sciences and Technology (IST) at Pennsylvania State University. Fielded in the fall of 2006, the Security and Risk Analysis Major addresses government and industry needs for graduates better prepared for Information Assurance careers through a unique socio technical curriculum. The program is the result of a thorough review of existing academic programs, published industry needs analyses, guidance from the federal government and recommendation from an advisory board created specifically for this program. The objectives of the major go beyond simply providing the theoretical framework and skill sets needed for a career in security and related analyses by providing exposure through problem based learning to current, real life challenges and problems. The pedagogy of the major is based on lecture, web-based learning, industry-endorsed case studies, term projects and industry-sponsored practice. Keywords: information assurance, pedagogy, security, risk analysis, case study 1. INTRODUCTION The need for an Integrated Approach Information Assurance (IA) is field of practice focused on managing the risks associated with storing, processing, and transmitting information. A superset of information security and security engineering, IA is also concerned with governance (e.g. compliance, privacy, audits, business continuity, and disaster management and recovery). Both corporate executives and government officials around the world have identified countering information security threats as one of their highest priorities, yet they are forced to depend on a small pool of IA professionals that have both technical and business knowledge needed to address these increasingly pervasive and complex threats. The global shortage of experienced IA professionals is further compounded by the intelligence analyst and cyber forensics shortages in organizations like the United State s Department of Homeland Security (DHS) and National Security Agency (NSA) and by
4 ISEDJ 7 (75) Marchant, Cole, and Chu 4 increased public and private sector regulatory compliance requirements. The demand for IA professionals is clearly a global issue. Extremely attractive incentives are being offered to (and accepted by) IA professionals from emerging markets around the world. For example, a study (IDC, 2006) conducted by IDC for the International Information Systems Security Certification Consortium (ISC) 2 estimates that the number of information security professionals worldwide in 2006 is 1.5 million, an 8.1% increase from IDC predicts that the demand for IA professionals will grow to in excess of 2 million by This equates to a worldwide compound annual growth rate of close to 8% (6.4 in the Americas) (IDC, 2006). In creating the Security and Risk Analysis Major (SRA), the College of Information Sciences and Technology (IST) at Pennsylvania State University performed a benchmark analysis of 67 universities with majors recognizable as being information security and assurance related and recognized (in 2005) as Centers of Academic Excellence in IA Education (NSA, 2007) by the NSA and DHS. This analysis indicated that most university programs focused on technologybased security with very few (Liberal Arts) colleges offering programs that included intelligence studies. The conclusion reached from this analysis was that no school reviewed provides a major that integrates Information Technology, Information Assurance, Intelligence Analysis, and Cyber Forensics into one curriculum. Understandably, IST crafted the SRA to be compliant with the criteria defined for recognition as a center of academic excellence (this criterion is maintained by the Committee on National Security Systems (CNSS) (CNSS, 2007). Developmental Influences The content of the SRA program was developed under several influences. The first of these, the results of the benchmark analysis, is described above. This analysis showed the need for an integrated, multidisciplinary program going beyond the traditional technical courses to include courses from law, business and liberal arts colleges. Published industry survey data was a second source of recommendation for the SRA program, in particular a survey from the SANS Institute ( The SANS 2005 Information Security Salary and Career Advancement Survey (SANS, 2005). The survey contains the responses of over 4000 security professionals. As part of the survey, the participants were asked to rate the importance of areas of critical skills necessary for advancement as very important, important, not important, or no opinion. Table 1 shows the percentage ratings for the Very Important category for each of the 12 areas surveyed. Although interpreting the meaning of the absolute percentages may be problematic, clearly the ranking implied by these percentages indicates the relative importance these highly skilled professionals place on the categories of critical thinking, communications, teamwork, and ability to lead. Surprisingly, the responses indicated that slightly more participants feel two of these areas are more important than technical knowledge! Based on these findings, IST determined that the SRA major must include training in critical thinking, communications, teamwork, and leadership. Table 1: Very Important response, adapted from (SANS, 2005) Area % Critical thinking and judgment. 69% Communications (verbal and written). 68% Technical knowledge. 66% Teamwork and collaboration. 52% Ability to lead change. 52% Business knowledge/acumen. 40% Cross functional influence. 35% Influence. 33% Facilitation. 24% Mentoring and coaching. 19% Strategic business planning. 22% Industry participation. 13% A third influence on the development (and continued maintenance) of the program was the SRA advisory board. Consisting of representatives of government, industry, and academia, the board emphasized the importance of SRA graduates understanding the following:
5 ISEDJ 7 (75) Marchant, Cole, and Chu 5 The blending of digital and physical elements of security. Contextual aspects of security from a multi-cultural perspective Legal, regulatory and ethical issues associated with security (e.g. privacy, intellectual property). Critical thinking and problem solving Analytical skills (e.g. data mining) Communication skills. Risk Management, including integration of risk, security, governance, and compliance. Methods of cyber crime and cyber warfare Policy trade-offs involving protection of data and the sharing of that data with others. The use of technologies employed in government and business Based on the needs identified by the sources described above, IST determined that the SRA curriculum should provide training in: Communications Leadership Crisis management Conflict resolution Ethics Cultural sensitivity Human relationship building Decision making/problem solving Technology impacts on society Teamwork balanced with individual assessment 2. THE SRA MAJOR As discussed above, IST created the SRA major to address the high demand for graduates with solid technical skills, strong interpersonal skills, forensics and analysis training, and an interdisciplinary and global perspective. A minimum of 120 credits is required for a bachelor of science in IST. For the SRA major, these credits are divided into the following categories: Electives: 3 credits General Education: SRA Common: SRA - Option 23 credits 73 credits 21 credits Within the SRA major, there are three options based on an interdisciplinary curriculum that integrates study in information assurance, intelligence analysis, and cyber forensics. The Intelligence Analysis and Modeling Option focuses on developing a more thorough knowledge of the strategic and tactical levels of intelligence collection, analysis, and decision-making. The Information and Cyber Security Option focuses on the theories, skills, and technologies associated with network security, cyber threat defense, information warfare, and critical infrastructure protection. The Social Factors and Risk Option examines the legal, regulatory, ethical, and other social aspects of security and risk with the intent of providing understanding of the social factors and causes that are linked to transnational terrorism, criminal investigations, and litigation involved in business and other security-related environments. The typical schedule has students taking classes common to all 3 options for the first four semesters followed by option-specific classes in the last four semesters. Summers are designated for supervised experience in business, industry, or the public sector. Table 2: Common Requirements Prescribed courses: (43 credits) CMPSC 101 (3) SRA 111 (3) IST 110 (3) ACCTG 211 (4) MICRB 106 (3) And MICRB 107 (1) SRA 211 (3) SRA 221 (3) Introduction to algorithmic processes Introduction to security and risk analysis Information, people, and technology Financial and managerial accounting for decision making Elementary microbiology (with lab) Threat of terrorism and crime Overview of information security
6 ISEDJ 7 (75) Marchant, Cole, and Chu 6 SRA 231 (3) STAT 200 (4) IST 495 (1) IST 432 (3) SRA 311 (3) STAT 460 (3) IST 440W (3) Decision theory and analysis Elementary statistics Internship (1 required, can have up to 3) Legal and regulatory environment of IST Risk management assessment and mitigation Intermediate applied statistics IST integration Additional courses: (12 credits) AG BM 101 (3) or ECON 002 (3) PL SC 001 (3) PL SC 014 (3) or GEOG 040 (3) PSYCH 100 (3) Or SOC 005 (3) ENGL 202C (3) or ENGL 202D (3) Economic principles of agrabusiness, Economics Political Geography Science, Introduction to Psychology Social Problems Technical writing Business writing Supporting courses and realated areas.: (18 credits) Third-level proficiency in a foreign language (12) International Courses (6) Various Various A total of 21 credits are required for each SRA option. These along with the 73 credits common across all SRA options constitute the 94 credit SRA requirement. Details of the common requirements are presented in Table 2. Intelligence analysis and modeling (IAM) This option focuses on developing knowledge of the strategic and tactical levels of intelligence collection, analysis, and decision-making. This includes examining the foundations of decision analysis, economic theory, statistics, data mining, and knowledge management. As shown in Table 3, it has 5 required courses (15 credits) and 6 supporting credits selected from 8 alternatives. Table 3: IAM option requirements Prescribed courses: (15 credits) ADM J 111 (3) ECON 302 (3) ECON 402 (3) PL SC 409 (3) PL SC 439 (3) Introduction to the American criminal justice system Intermediate microeconomic analysis. Decision making and strategy in economics. Quantitative analysis political The policitics of terrorism Additional courses: (6 credits) ADM J 462 (3) PL SC 442 (3) STAT 480 (1) GEOG 103 (3) GEOG 121 (3) GEOG 124 (3 GEOG 128 (3) GEOG 357 (3) Comparative justice system. criminal American foreign policy Introduction statistical packages to program Geography of the developing world Mapping our changing world Elements of cultural geography Geography international affairs of Geographic information systems
7 ISEDJ 7 (75) Marchant, Cole, and Chu 7 Information and cyber security (ICS) In the ICS option, the focus is on network security, cyber threat defense, information warfare, and critical infrastructure protection. As shown in Table 4, it has 4 required courses (12 credits) and 9 supporting credits selected from 8 alternatives. Table 4: ICS option requirements Prescribed courses: (12 credits) IST 220 (3) IST 451 (3) IST 454 (3) IST 456 (3) Networking telecommunications Network security and Computer and cyber forensics Security and risk management Additional courses: (9 credits) ADM J 433 (3) IST 210 (4) IST 301 (3) IST 302 (3) MGMT 100 (3) IST 452 (3) IST 402 (3) IST 442 (3) Computer Security Organization of data Information and organizations IT project management Survey of management Legal and regulatory environment of privacy and security Emerging issues and technologies IT in and international context Social factors and risk (SFR) This option includes an examination of the legal, regulatory, ethical, and other theories associated with security and risk focused on understanding the social factors and causes that are linked to transnational terrorism, criminal investigations, and litigation involved in business and other securityrelated environments. As shown in Table 5, it has 4 required courses (12 credits) and 9 supporting credits selected from 8 alternatives Table 5: SFR option requirements Prescribed courses: (12 credits) PSYCH 270 (3) PL SC 410 ( 3) IST 452 ( 3) PSYCH 445 (3) Intro to abnormal psychology Game theory and international relations Legal and regulatory environment of privacy and security Quantitative analysis Additional courses: (9 credits) ADM J 310 (3) ADM J 311 (3) ADM J 200 (3) ADM J 340 (3) INS 301 (3) COMM 180 (3) COMM 490 (3) IST 453 (3) Forensic science I Forensic science II political Introduction to security and loss control Fundamental technologies of scientific criminal investigation Risk and insurance Survey of electronic media and telecommunications Issues in electronic commerce policy and implementation Legal, regulatory, policy environment of cyber forensics The program courseware has also been certified by the Committee on National Security Systems and the NSA as having met national training standards for: Information Systems Security Professionals (NSTISSI # 4011) Senior Systems Managers (CNSSI # 4012) Systems Administrators (CNSSI # 4013) Information Systems Security Officers (CNSSI #4014) Systems Certifiers (NSTISSI # 4015)
8 ISEDJ 7 (75) Marchant, Cole, and Chu 8 3. PEDAGOGY The skills taught in the SRA program must be practiced. A problem-based approach with ample case studies, term projects, and labs both provides the Confucius-described prescription of I do and I understand and increases the enjoyment of the learning experience. The learning pedagogy of the SRA program has four parts: lecture, practice, project, and experience. Lectures are provided via multi-media in classrooms and enhanced with web-based learning modules. Practice is via case studies, labs, and problem based exercises. Projects are term long and most often require collaboration and teamwork. Experience comes via guest speakers, field trips, and internships. Even the most basic of SRA classes strive to maintain this pedagogical template. As an example, SRA 111, Introduction to Security and Risk Analysis, is an introductory course with a broad focus, spanning security, risk and analysis. In addition to familiarizing the student with basic security terminology, it touches upon social and legal issues, risk analysis and mitigation, crime intelligence and forensics, and information warfare and information assurance. The lectures/web based learning part of the course is presented in 6 modules: 1. Motivation, which addresses the why of security and risk analysis, discusses the national strategy to secure cyberspace, and encourages class participation in reviewing current efforts and challenges. The intent of this module is to provide the big picture perspective for the remaining modules of the course. 2. Basic Concepts, which covers authentication and encryption methods, PKI and digital signatures, logical and physical security, and operation systems versus application security 3. Social and legal issues, which includes topics such as identity theft, social engineering, spam, spyware, and adware 4. Analysis and methods, which focuses on vulnerability assessment, intelligence analysis, forensic analysis, risk assessment, risk analysis and risk mitigation 5. Information warfare and assurance, which covers topics such as footprinting, sniffing, port scanning, intrusion prevention and detection, Denial of Service (DoS), and wardriving 6. Securing the future, a module which most recently included topics such as security planning and policy, outsourcing and open source security, and the impact of Sarbanes Oxley Act and HIPPA. In addition, there are guest speaker presentations, videos, and 36 readings. Students are required to complete 3 hands on exercises (risk analysis, backup planning, and vulnerability assessment and mitigation). They must submit current event reports and complete a team based term project on security awareness program development. Term Projects Term projects typically incorporate exercise of skills relating to knowledge of people, of business environments and processes, and of technology. The term project for IST 451, Network Security, provides a good example. The term project revolves around a small company that manufactures gloves. The company is just becoming large enough (automated enough) to require connection of internal networks to the Internet. The students, working in teams, must help the company navigate through the stressful process of safely connecting its networks at multiple sites, allowing remote employee access, and hosting an e-commerce site. The students must perform a vulnerability analysis, create a security policy, and design a firewall and VPN deployment strategy. The IST 451 term project requires delivery of 4 separate reports. Several business processes for the company must be detailed (showing knowledge of business processes). These processes are then used to create a topology for each relevant department participating in each business process. The students must then perform a vulnerability analysis identifying the major goals of possible attack. For each major goal they must create penetration scenarios using the blind remote attack, the user-level attack and a physical attack. The first report required for the term project is the results of this vulnerability analysis.
9 ISEDJ 7 (75) Marchant, Cole, and Chu 9 The second report takes the results of the vulnerability analysis and requires the students to create a global security policy. A global security policy is required as it involves an understanding of human nature, management responsibility, and organizational structure in addition to security technology. The completed global security policy must be comprehensive yet practical, usable, expandable (adaptable), concise, clear, and enforceable. From the technology perspective it must include descriptions of firewalls, intrusion detection systems, access controls, authentication methods, auditing, computing systems security physical security, and operational security. The third and fourth reports are more technology focused. The third report is centered on firewalls, and the fourth on VPN. In these two reports, the students must define the requirements for the firewalls and VPN, design the deployment of the firewalls and VPN, and create the management and maintenance plans for the firewalls and the VPN. Once again, the reports are not considered complete unless the people focused management and maintenance plans are adequate. Hands-on Exercises The SRA program takes full advantage of the lab environments at the college of IST including a Cyber Security Lab, Cyber Defense Lab, Cyber Forensics Lab, Mobile Computing, Sensor Network Test Bed, and RFID Test Bed to create abundant opportunities for hands-on exercises. These exercises incorporate hands-on experience with technology in a context incorporating collaborative and action learning elements of problem-based learning. For example, IST 454, Computer and Cyber Forensics, includes seven laboratory exercises that illustrate different aspects of computer and cyber crime and ways in which to uncover, protect, exploit, and document digital evidence. Through these exercises, students are exposed to various hardware and software tools along with forensic techniques and procedure. Working in groups, the students utilize these resources to perform rudimentary forensic investigations. Table 6 lists the lab exercises for this course along with a brief description of the objectives of each exercise. Like most SRA courses, IST 454 also requires a term project; in this case revolving around mobile forensics (cell phone, PDA). Table 6. IST 454 Lab Exercises Exercise Data Acquisition (imaging) Forensic Analysis Investigating Windows Systems Hostile Code Network Forensics PDA Forensics Steganography Objectives Use imagning tools to obtain a forensically sound image of a suspect s hard disk Use analysis tools to perform forensic analysis of a suspect s hard drive Use analysis tools to perform forensic analysis of the registry from a windows machine Understand virus behavior through interaction with and analysis of a virus sample Use network scanning, sniffing intrusion detection and protocol analysis tools to analyze a network packet capture file. Use tools to acquire data from a mobile device and perform subsequent forensic analysis Use tools to hide and recover data in multimedia files 4. CONCLUSION The IST SRA program is designed to meet industry and government needs for security professions possessing a wide range of skills. As shown in Figure 1, the program has the elements that meet the requirements derived from a review of existing academic programs, industry inputs, and direction from our advisory board. Our common requirements courses (Table 2) provide the foundation that allows SRA graduates to understand how IT works, gives them practical analytical thinking skills and experience, and provides a working understanding of the legal and social issues they will encounter. Our learning pedagogy emphasis teamwork and leadership skills,
10 ISEDJ 7 (75) Marchant, Cole, and Chu 10 and provides ample opportunity for practice. The program s three options provide focused material on specific, but high-demand needs of industry, government and academia. This multidisciplinary, socio-technical focus of the SRA program is producing graduates with the diverse skills required for effective leadership in a secure global digital economy. Table 7. Enrollment Course SRA 111 SRA 211 SRA 221 Fall 2006 Spring 2007 Fall To be successful, the SRA program must attract students in order to provide capable graduates. Although it is too early in the program s development to predict graduate levels, our initial data indicates strong interest and participation in the program. Table 7 shows the enrollment for key courses for the SRA major and indicates the SRA major is off to an excellent start. 5. REFERENCES IDC, 2006 Global Information Security Workforce Study, accessed June 15, estudy06.pdf NSA, National Security Agency Central Security Services Centers of Academic Excellence, accessed June 15, cfm CNSS, Committee on National Security Systems, accessed June 15, SANS, The SANS 2005 Information Security Salary and Career Advancement Survey, accessed June 15,
11 ISEDJ 7 (75) Marchant, Cole, and Chu 11 APPENDIX Security and Risk Analysis Intelligence Analysis Core Courses: Security & Risk Analysis Threats of Terrorism & Crime Information Security Decision Theory & Analysis Risk Management Legal, Regulatory, and Ethical Issues Capstone Information & Cyber Security Support (partial list): Network Security Management/Accounting & Finance Intro. Forensic Science Computer & Cyber Forensics Financial Crime Database/Web Security Wireless Security Social Factors & Risk Problem Solving Project Management Teamwork & Leadership Culture & Language Writing & Presentation Hands-on & Internship Information Technologies Information, People & Tech. Organization of Data Networking & Telecom. Algorithmic Processes Analytical Thinking Mathematics Statistics Game Theory Data Mining Legal, Social, Behavior Economics/Business Psychology World Culture & Religion Political Science Figure 1. The SRA Major
How To Get A Bachelors In Business
Penn State Berks Bachelor of Science in Business OUR MISSION The Penn State Berks Bachelor of Science in Business program mission is to engage and develop learners in the core business disciplines through
Information Systems and Tech (IST)
California State University, San Bernardino 1 Information Systems and Tech (IST) Courses IST 101. Introduction to Information Technology. 4 Introduction to information technology concepts and skills. Survey
Department of Information Systems and Cyber Security
The University of Texas at San Antonio 1 Department of Information Systems and Cyber Security All graduate programs in Information Systems and Cyber Security are accredited by AACSB International The Association
College of Information Sciences and Technology. The Roadmap
College of Information Sciences and Technology The Roadmap A Bachelor s Degree Guide 2015-2016 Undergraduate Advising Center 104 Information Sciences and Technology Building Phone: 814-865-8947; Toll Free
School of Management and Information Systems
School of Management and Information Systems Business and Management Systems Information Science and Technology 176 Business and Management Systems Business and Management Systems Bachelor of Science Business
Computer and Information Science
Computer and Information Science www.odessa.edu/dept/computer Faculty: Katrieva Jones- Munroe, chair The computer information systems curriculum provides students with practical, job- related computer
Scholarship for Service (SFS) PhD with Information Assurance (IA) Concentration*
Scholarship for Service (SFS) PhD with Information Assurance (IA) Concentration* University of North Texas (UNT) received a NSF award to provide scholarships, including stipends, tuition, health insurance,
MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY
MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY HTTP://SCIENCE.HAMPTONU.EDU/COMPSCI/ The Master of Science in Information Assurance focuses on providing
Bachelor of Information Technology (Network Security)
Bachelor of Information Technology (Network Security) Course Structure Year 1: Level 100 Foundation knowledge subjects SEMESTER 1 SEMESTER 2 ITICT101A Fundamentals of Computer Organisation ITICT104A Internetworking
Interdisciplinary Program in Information Security and Assurance. By Kossi Edoh NC A&T State University Greensboro
Interdisciplinary Program in Information Security and Assurance By Kossi Edoh NC A&T State University Greensboro Information Assurance The protection of electronic information and infrastructures that
Introduction to Cyber Security / Information Security
Introduction to Cyber Security / Information Security Syllabus for Introduction to Cyber Security / Information Security program * for students of University of Pune is given below. The program will be
TUSKEGEE CYBER SECURITY PATH FORWARD
TUSKEGEE CYBER SECURITY PATH FORWARD Preface Tuskegee University is very aware of the ever-escalating cybersecurity threat, which consumes continually more of our societies resources to counter these threats,
Certified Information Systems Auditor (CISA)
Certified Information Systems Auditor (CISA) Course Introduction Course Introduction Module 01 - The Process of Auditing Information Systems Lesson 1: Management of the Audit Function Organization of the
Homeland Security Graduate Programs
Homeland Security Graduate Programs TABLE OF CONTENTS Homeland Security Portfolio...3 Homeland Security Master s Degree Base Program and Graduate Certificate... 4 5 Public Health Preparedness... 6 7 Geospatial
Bellevue University Cybersecurity Programs & Courses
Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320
USING INFORMATION ASSURANCE CURRICULUM STANDARDS AS A BASIS FOR A GRADUATE DEGREE
USING INFORMATION ASSURANCE CURRICULUM STANDARDS AS A BASIS FOR A GRADUATE DEGREE N. Paul Schembari, Mike Jochen East Stroudsburg University of Pennsylvania {nschembari, mjochen}@esu.edu ABSTRACT We describe
INFORMATION SYSTEMS, BACHELOR OF SCIENCE (B.S.)
VCU INFORMATION SYSTEMS, BACHELOR OF SCIENCE (B.S.) The mission of the Bachelor of Science in Information Systems is to equip students for successful careers as information systems professionals by offering
Future of Digital Forensics: A Survey of Available Training
Future of Digital Forensics: A Survey of Available Training A. Evans, A. Williams, and J. Graham Computer Science Department, Norfolk State University, Norfolk, VA USA Abstract The field of forensics is
Information Security Curriculum Creation: A Case Study
Information Security Curriculum Creation: A Case Study Bradley Bogolea College of Engineering The Pennsylvania State University University Park, Pa 16802 [email protected] Kay Wijekumar School of Information
CRIMINAL JUSTICE PROGRAM
CRIMINAL JUSTICE PROGRAM University Plaza, Building D (435) 652-7815 http://dixie.edu/criminal_justice/index.php To find faculty & staff phone numbers and email addresses, please consult the University
Information Systems Education Journal
Volume 9, No. 6 ISSN: 1545-679X Information Systems Education Journal In this issue: 4 Using Business Analysis Software in a Business Intelligence Course Juan Elizondo, St. Mary s University Monica J.
Online Bachelor s Degree Completion Program. A Degree Completion Program for Working Adults. Log in to a Distinguished Tradition. Since 1819.
Online Bachelor s Degree Completion Program A Degree Completion Program for Working Adults Log in to a Distinguished Tradition. Since 1819. Proudly serving those who serve Norwich University has a proud
Information Systems Education Journal
Volume 11, No. 4 August 2013 ISSN: 1545-679X Information Systems Education Journal In this issue: 4. "Consumerization of IT" - Challenges for IS Education Wai Law, University of Guam 10. Developing an
RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY-274 Privacy, Ethics & Computer Forensics
RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE CISY-274 Privacy, Ethics & Computer Forensics I. Basic Course Information A. Course Number & Title: CISY-274 - Privacy, Ethics, & Computer Forensics B. New
1. Introduction to ehealth:
1. Introduction to ehealth: E-Health is one of the fastest growing areas within the health sector. The scope of e- Health involves application of the knowledge, skills and tools, which enable information
Executive Leadership MBA Course Descriptions
Executive Leadership MBA Course Descriptions MBA 608: Interpersonal Leadership and Managing Organizational Behavior (3 credits) This course provides rising stars learning opportunities to take the next
Appendix A: Gap Analysis Spreadsheet. Competency and Skill List. Critical Thinking
Appendix A: Gap Analysis Spreadsheet Competency and Skill List Competency Critical Thinking Data Collection & Examination Communication & Collaboration Technical Exploitation Information Security Computing
INFORMATION SYSTEMS (INFO)
VCU 1 INFORMATION SYSTEMS (INFO) INFO 160. Digital Literacy: Computer Concepts, Internet, Digital Devices. 1 Hour. Semester course; 1 credit. Overview of basic computer concepts, the Internet, new technologies
MS Information Security (MSIS)
MS Information Security (MSIS) Riphah Institute of Systems Engineering (RISE) Riphah International University, Islamabad, Pakistan 1. Program Overview: The program aims to develop core competencies in
Department of Political Science and Criminal Justice
Department of and Department of and Department Chair: G. Michael Stathis General Classroom 406 ~ (45) 586-5429 [email protected] Administrative Assistant: Sandi Levy General Classroom 406 ~ (45) 586-5429
DEPARTMENT OF PSYCHOLOGY, SOCIOLOGY, AND CRIMINAL JUSTICE SCHOOL OF LIBERAL ARTS
School of Liberal Arts DEPARTMENT OF PSYCHOLOGY, SOCIOLOGY, AND CRIMINAL JUSTICE SCHOOL OF LIBERAL ARTS Dr. Abe Marrero, Department Head Dr. Brian Andrews Dr. Diana Clayton Ms. Christian Mackey Ms. Cheri
Executive Leadership MBA Course Descriptions
Executive Leadership MBA Course Descriptions MBA 608: Interpersonal Leadership and Managing Organizational Behavior (3 credits) This course provides rising stars learning opportunities to take the next
Members Present: Mark Finlay, Pam Sears, Rick McGrath, Mike Price, Michael Donahue, and Erik Nordenhaug.
COLLEGE OF LIBERAL ARTS Curriculum Committee Meeting Report 21 January 2011 Members Present: Mark Finlay, Pam Sears, Rick McGrath, Mike Price, Michael Donahue, and Erik Nordenhaug. Guests: Dan Skidmore-Hess
DEPARTMENT OF HISTORY AND POLITICAL SCIENCE SCHOOL OF LIBERAL ARTS
DEPARTMENT OF HISTORY AND POLITICAL SCIENCE SCHOOL OF LIBERAL ARTS Dr. Kenneth Hicks, Department Head Dr. Michael Beauchamp Dr. Paul Hatley Dr. Steve Housel Dr. Jane Johansson Dr. Quentin Taylor Dr. David
SECURITY CAREERS. Defining Jobs, Compensation, Qualifications. by Jerry Brennan and Steve Walker
SECURITY CAREERS Defining Jobs, Compensation, Qualifications by Jerry Brennan and Steve Walker SECURITY CAREERS DEFINING JOBS, COMPENSATION, QUALIFICATION Table of Contents Chapter 1: Helping the Industry
International Program for Bachelor of Science (Software Engineering) College of Arts, Media and Technology, Chiang Mai University
Responsible Units: International Program for Bachelor of Science (Software Engineering) College of Arts, Media and Technology, Chiang Mai University 1. Name of the Program Bachelor of Science Program in
The Case for Support: The Center for Cyber Security Studies at the U. S. Naval Academy
The Case for Support: The Center for Cyber Security Studies at the U. S. Naval Academy Computer and network security threats of the future are of concern today, and new strategies are required to ensure
DEGREE PROGRAMS, CONCENTRATIONS AND CERTIFICATES
DEGREE PROGRAMS, CONCENTRATIONS AND CERTIFICATES ACCOUNTING Bachelor of Arts 150 credits ADDICTIONS AND SUBSTANCE Bachelor of Arts 13 ABUSE COUNSELING ADMINISTRATION Bachelor of Arts 13 Concentrations:
Wyoming Community College Commission Request for New, Pilot or Revised Degree or Certificate Program
Community Commission Request for New, Pilot or Revised Degree or Certificate Program A. : Laramie County Community B. Date submitted to WCCC: C. Program 1. Request for: X New Program Pilot Program Revised
Information Technology Division
151 xxx Introduction to IT Division The Higher Colleges of Technology offers one of UAEÕ s largest selections of Information Technology programs. Students study Diploma, Higher Diploma and Bachelor Degree
MATH 4446 Mathematics Research/Project
MATH 4146 Mathematics Research/Project 1 Credit Hour The student plans and implements an independent mathematical study under the direction of faculty, using facilities available at Huston-Tillotson University
Information Security Policy
Information Security Policy Steve R. Hutchens, CISSP EDS, Global Leader, Homeland Security Agenda Security Architecture Threats and Vulnerabilities Design Considerations Information Security Policy Current
How To Get A Computer Hacking Program
CHFI v8(computer Hacking Forensics Investigator) Course Description & Overview Overview CHFIv8 Course Description EC-Council releases the brand new Version 8 of the Computer Hacking Forensics Investigator
Master of Science in Information Systems & Security Management. Courses Descriptions
Master of Science in Information Systems & Security Management Security Related Courses Courses Descriptions ISSM 530. Information Security. 1 st Semester. Lect. 3, 3 credits. This is an introductory course
Online Computer Science Degree Programs. Bachelor s and Associate s Degree Programs for Computer Science
Online Computer Science Degree Programs EDIT Online computer science degree programs are typically offered as blended programs, due to the internship requirements for this field. Blended programs will
Computer Security Courses/Programs
Minneapolis, MN. Computer Security Courses/Programs Developed at Metropolitan State University Jigang Liu Department of Information and Computer Sciences College of Arts and Sciences Metropolitan State
Finance, International Business and Marketing
304 Finance, International Business and Marketing Finance, International Business and Marketing Degrees, Certificates and Awards Associate in Arts: Finance Associate in Arts: International Business Associate
Prequalification Education, Assessment of Professional Competence and Experience Requirements of Professional Accountants
9 First Issued July 1991 Revised October 1996 Prequalification Education, Assessment of Professional Competence and Experience Requirements of Professional Accountants CONTENTS Preface Introduction...
Clarke College. Physical Education Program Outcomes
184 Kinesiology Mission The kinesiology department strives to incorporate the elements of Clarke College s mission in the acquisition of knowledge, freedom, charity and justice. The kinesiology department
Principles of Information Assurance Syllabus
Course Number: Pre-requisite: Career Cluster/Pathway: Career Major: Locations: Length: 8130 (OHLAP Approved) Fundamentals of Technology or equivalent industry certifications and/or work experience. Information
Finance, International Business and Marketing
Finance, International Business and Marketing 295 Finance, International Business and Marketing Degrees, Certificates and Awards Associate in Arts: Finance Associate in Arts: International Business Associate
Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted.
Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted. Administrative Awareness Case Study: Government Offices Certification and Accreditation:
CRIMINAL JUSTICE, BACHELOR OF SCIENCE (B.S.) WITH A CONCENTRATION IN FORENSIC CRIME SCENE INVESTIGATION
VCU 1 CRIMINAL JUSTICE, BACHELOR OF SCIENCE (B.S.) WITH A CONCENTRATION IN FORENSIC CRIME SCENE INVESTIGATION The major objective of this degree program is to prepare students for effective professional
Accounting and Financial Management (ACFM)
Bucknell University 1 Accounting and Financial Management (ACFM) Major Requirements Accounting and financial management are becoming progressively more complicated. Thus accounting and financial management
Information Systems. Administered by the Department of Mathematical and Computing Sciences within the College of Arts and Sciences.
Information Systems Dr. Haesun Lee Professor Dr. Haesun Lee is a Professor of Computer Science. She received her Ph.D. degree from Illinois Institute of Technology, Chicago, Illinois (1997). Her primary
CURRICULUM VITAE OF NANCY L. MARTIN, PH.D. I. PROFESSIONAL AFFILIATION AND CONTACT INFORMATION
CURRICULUM VITAE OF NANCY L. MARTIN, PH.D. I. PROFESSIONAL AFFILIATION AND CONTACT INFORMATION A. Present University Department or Unit: Information Systems Technologies School of Information Systems and
Political Science. Brigham Young University Idaho 2012-2013. Department of Political Science
Department of Sean Cannon, Department Chair Duane Adamson, Jerry Hansen, Bob Inama, Jeremy Lamoreoux, Trent Rose MarcAnna Gohr, Secretary (208) 4-4220 http://www.byui.edu/polisci Introduction The goal
COURSE DESCRIPTIONS IN MANAGEMENT
COURSE DESCRIPTIONS IN MANAGEMENT MIS 241. Introduction to Management Information Systems Credit 3(3-0) This course is an introduction to management information systems and their role in supporting and
Critical Controls for Cyber Security. www.infogistic.com
Critical Controls for Cyber Security www.infogistic.com Understanding Risk Asset Threat Vulnerability Managing Risks Systematic Approach for Managing Risks Identify, characterize threats Assess the vulnerability
Protecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid
Protecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid Which is it? Cyber Security ~or~ Cybersecurity? Dr. Ernie Lara President Presenters Estrella Mountain Community College Dr.
Management. University of New Orleans/268
Management MANG 2790 Business Communication Prerequisite: ENGL 1158 and BA 2780. This course will introduce students to the interaction of business communications and information technology in the 21st
B.S. in Sport & Recreation Management Curriculum
B.S. in Sport & Recreation Management Curriculum School of Tourism & Hospitality Management Curriculum 64 Credits Foundation Requirements 25 Credits STHM 1113 STHM 2114 STHM 3185 STHM 4112 STHM 4185 Foundations
Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government
Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government Briefing W. Frisch 1 Outline Digital Identity Management Identity Theft Management
167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College
167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College Information Security Certificate: Designed to introduce students to programming, security basics, network monitoring,
Information Security & Intelligence
Information Security & Intelligence Why Choose Information Security & Intelligence? The ISI program is certified by NSA's Information Assurance Courseware Evaluation Program as a National Center of Academic
Chapter 7 Information System Security and Control
Chapter 7 Information System Security and Control Essay Questions: 1. Hackers and their companion viruses are an increasing problem, especially on the Internet. What can a digital company do to protect
New Program Proposal Bachelor of Arts Intelligence and National Security Coastal Carolina University
New Program Proposal Bachelor of Arts Intelligence and National Security Coastal Carolina University Summary Coastal Carolina University requests approval to offer a program leading to the Bachelor of
HIT Workflow & Redesign Specialist: Curriculum Overview
HIT Workflow & Redesign Specialist: Curriculum Overview Component - Description Units - Description Appx. Time 1: Introduction to Health Care and Public Health in the U.S. Survey of how healthcare and
RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY 229 Information Security Fundamentals
RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE CISY 229 Information Security Fundamentals I. Basic Course Information A. Course Number & Title: CISY-229 Information Security Fundamentals B. New or Modified
Apply today: strayer.edu/apply SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY MASTER OF SCIENCE IN INFORMATION SYSTEMS RECOGNIZED MARKETABLE FLEXIBLE
RECOGNIZED PROVEN RESPECTED MARKETABLE FLEXIBLE Fernanda Tapia Student SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY MASTER OF SCIENCE IN INFORMATION SYSTEMS Apply today: strayer.edu/apply FLEXIBLE / AFFORDABLE
Computer Information Technology
Computer Information Technology Business and Social Sciences Division, Room A44, (847) 543-04 The Computer Information Technology degree programs provide five specialty options with a common core of general
Certified Cyber Security Analyst VS-1160
VS-1160 Certified Cyber Security Analyst Certification Code VS-1160 Vskills certification for Cyber Security Analyst assesses the candidate as per the company s need for cyber security and forensics. The
Master of Business Administration
Four business-critical themes are central to Curry College s Master in Business Administration (MBA). The unique framework for the model of business excellence integrates: I. Leadership and Ethics II.
2050.30 Master of Public Administration
2050.30 Master of Public Administration The Master of Public Administration degree is nationally recognized as the preferred professional graduate degree for those wishing to enter or advance in careers
FDU-Vancouver Bachelor of Science in Business Administration - International Business concentration Course Descriptions
FDU-Vancouver Bachelor of Science in Business Administration - International Business concentration Course Descriptions ACCT 2021 Intro Financial Accounting An introduction to the concepts underlying an
Cyber Security at NSU
Cyber Security at NSU Aurelia T. Williams, Ph.D. Chair, Department of Computer Science Associate Professor of Computer Science June 9, 2015 Background Undergraduate computer science degree program began
MEMORANDUM OF UNDERSTANDING. MILWAUKEE AREA TECHNICAL COLLEGE: AAS Criminal Justice Law Enf. AND CARDINAL STRITCH UNIVERSITY: BS Criminal Justice
MEMORANDUM OF UNDERSTANDING MILWAUKEE AREA TECHNICAL COLLEGE: AAS Criminal Justice Law Enf. AND CARDINAL STRITCH UNIVERSITY: BS Criminal Justice This articulation agreement establishes a relationship between
Department of Accounting
The University of Texas at San Antonio 1 Department of Accounting Mission Statement The mission of the Department of Accounting is to advance accounting knowledge and practice through excellence in accounting
