PSA 547 Information Security and Technology



Similar documents
Textbooks: Small Business Management: Launching & Growing Entrepreneurial Ventures Longenecker, Petty, Palich and Hoy ISBN #

COURSE SYLLABUS. Instructor Background: M.S. Computer Information Systems, Nova Southeastern University

Human Sexuality (PSY 3800) Clayton State University Syllabus-Fall 2012 NBS 126 TR 3:35-4:50pm

COURSE SYLLABUS: INCOME TAX ACCOUNTING I

Counseling Psychology Tentative Syllabus

COURSE SYLLABUS. Instructor Background: M.S. Computer Information Systems, Nova Southeastern University


SYLLABUS FOR HUMAN RESOURCE MANAGEMENT

POFT 1309 Administrative Office Procedures I COURSE SYLLABUS

Course Syllabus CJ W Intro. to Homeland Security, Internet based Spring 2016

Introduction to General Psychology Spring 2014 PSY , Mon. & Wed.: 6-7:15

How To Pass A Customer Service Course At Tstc

COURSE SYLLABUS. Instructor Information:

Human Resource Management ( MGT 235) Fall, Credits. Phone: Office: E mail: Prerequisites: ENG 098, FYE 101, MAT 092, RDG 098 or placement.

COURSE NUMBER AND TITLE: Management Information Systems Concepts

Kent State University, College of Business Administration. Department of Accounting, Fall REVISED Aug 22, Instructor:

PROFESSOR: Dr. Marlene Kahla, Associate Professor, Assistant Department Chair, Director of Internships and Special Problems

BUS Computer Concepts and Applications for Business Fall 2012

SOC W: GLB/US Social Problems COURSE SYLLABUS Spring 2016

Kean University Department of Criminal Justice Ethics in Criminal Justice CJ Spring 2012

Karen D.W. Patterson, PhD Office: ASM 2089 Telephone:

Department of Computer & Information Sciences. INFO-450: Information Systems Security Syllabus

MIS 4336 Networks and Data Communication. Spring 2016

SOUTHEAST MISSOURI STATE UNIVERSITY COURSE SYLLABUS. AB 604: Advanced Professional and Ethical Conduct of Behavior Analysts I OFFERED ONLINE

Fall Syllabus. College of Health and Human Services. HAP 700: Introduction to Health Informatics. Course information

Psychological Tests and Measurements PSYC Summer 2016

MIS Information Systems for Management The University of Manitoba, I.H. Asper School of Business Department of Accounting and Finance

Public Human Resources Management PAD/NAL 630, PAD 518 Fall Christine L. Rush Office Hours: Tuesdays 4:00 5:00

SYLLABUS Human Resource Management MGMT 3241 Section 001 Spring 2006, MW 3:00-4:20 Friday 9

FORENSIC PSYCHOLOGY COURSE SYLLABUS PSY325 and CRIJ 325

Department of Computer & Information Sciences. CSCI-445: Computer and Network Security Syllabus

AEC 3073 INTERCULTURAL COMMUNICATION Ms. Mary Rodriguez

SOWK 7850 SOCIAL WORK PRACTICE IN SCHOOLS

Management 352: Human Resource Management Spring 2015 Syllabus

The University of Texas at Austin Department of Civil, Architectural and Environmental Engineering

Systems and Internet Marketing Syllabus Fall 2012 Department of Management, Marketing and International Business

Dr. Robert Yowell GOVT Office Hours: Spring 2014

Syllabus: AIT Information Systems Infrastructure Lifecycle Management

Law Practice Management Professor Jeanne Curtin Fall 2011 SYLLABUS

Secure Computer Systems

AEE 460: Foundations of Leadership Development Fall 2006 M/W/F, 11:15 12:05 p.m. 301 Ag Administration Bldg.

ABNORMAL PSYCHOLOGY (PSYCH 238) Psychology Building, Rm.31 Spring, 2010: Section K. Tues, Thurs 1:45-2:45pm and by appointment (schedule via )

EMPORIA STATE UNIVERSITYSCHOOL OF BUSINESS Department of Accounting and Information Systems. IS213 A Management Information Systems Concepts

SAM HOUSTON STATE UNIVERSITY College of Business Administration Department of General Business and Finance

UNIVERSITY OF WISCONSIN-EAU CLAIRE COLLEGE OF ARTS AND SCIENCES Department of Political Science Criminal Justice Program

JOMC 279: Advertising and Public Relations Research Methods Fall 2015 Class Time: 8:00am to 9:15am, Tuesdays and Thursdays Room: Carroll Hall 33

COURSE SYLLABUS PAD 3003 Section 05 Public Administration in Society: Online

Southern Illinois University Department of Political Science Master of Public Administration Program

Human Resources Management - Class Information

How To Understand Health Care In The United States

Research Methods in Advertising and Public Relations COMM 420 Spring Earth & Eng. Sci. W/F 12:20 PM to 2:15 PM

SIENA HEIGHTS UNIVERSITY CRIMINAL JUSTICE PROGRAM SYLLABUS CONTEMPORARY ISSUES IN CRIMINAL JUSTICE CRJ 445

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY 229 Information Security Fundamentals

PUAD 502 Administration in Public and Non-Profit Organizations Term Offered Fall, 2015 Syllabus

HEALTH INFORMATION TECHNOLOGY PROGRAM. HITT 1301 HEALTH DATA CONTENT AND STRUCTURE/Hybrid/CRN: Spring 2011

CRJU Introduction to Criminal Justice (CRN 20933) Course Syllabus Spring 2015

OTTAWA ONLINE BUS Management Information Systems

Cosc Microcomputer Applications Course Syllabus: Fall 2014

MOUNT ST. MARY S UNIVERSITY MBA PROGRAM SYLLABUS. Semester Theme: Foundations

IS Management Information Systems

I453 Computer and Information Ethics School of Informatics & Computing

ISM CRN St: Basic Android App Development

Moravian College Department of Economics and Business Management 223: Management and Organizational Theory

CEDAR CREST COLLEGE Psychological Assessment, PSY Spring Dr. Diane M. Moyer dmmoyer@cedarcrest.edu Office: Curtis 123

ECE E Language Acquisition and Development in Early Childhood Education COURSE SYLLABUS: Spring 2014

COURSE TEXTBOOK [Insert required course text academic format for book listing with ISBN# and edition]

COMM 192. Business Communications

Lisa K. Thompson, Ph.D., Instructor: (office); (fax); SYLLABUS Spring 2013

Nashville State Community College Business & Applied Arts Division Visual Communications/ Photography

THE UNIVERSITY OF CALGARY Faculty of Management. Management Information Systems 321 Course Outline -- Winter 1999

SAMPLE. PJM500: Project Management. Course Description and Outcomes. Credit Hours: 3

Systems and Internet Marketing Syllabus Spring 2011 Department of Management, Marketing and International Business

22-MGMT-3080 (003) Management Lindner College of Business University of Cincinnati Fall 2015

MIS 310: Management Information Systems (Spring 2015)

University of Colorado Denver College of Engineering & Applied Science CVEN 5235 Advanced Construction Engineering

Business Ethics (BUS 105) Cycle II, Spring, 2012 Semester

PRE 580/PSYC 598 Positive Psychology (Spring 2008) The University of Kansas, Edwards Campus Mondays, 4:30-7:00pm 153 Regnier Hall

SYLLABUS FIN 510: INVESTMENT SEMINAR University Center Dallas

CISM Fundamentals of Computer Applications

Human Resource Management Political Science (POLS) 543 Spring 2013 Course Meets: Tuesday and Thursday 11:00-12:15 p.m. Faner 3075

Political Science 2302: Section 03W United States & Texas Government: Institutions & Policies Spring Semester 2014 COURSE INFORMATION

Course Outline. Business 110

BUSA 3301: Business Communications (3-0-3)

AMBERTON UNIVERSITY SYLLABUS FOR LECTURE/CLASSROOM COURSE

FINC 4531 B Intermediate Corporate Finance Tuesdays and Thursdays from 5:30-6:45, Adamson 227 Expanded Course Outline Fall 2010

OCCUPATIONAL GROUP: Information Technology. CLASS FAMILY: Security CLASS FAMILY DESCRIPTION:

ERP 5210 Performance Dashboards, Scorecard, and Data Visualization Course Syllabus Spring 2015

Transcription:

PSA 547 Information Security and Technology Group Q (May 7, 2015 June 18, 2015) Professor: Dr. Tina Ebenger Office: 510 Office Phone: 219-473-4392 Home Phone: 219-365-9024 E-mail: tebenger@ccsj.edu (office) Course Time: Thursday, 8:30 12:30 Thursday, 6:00 10:00 Room 204 CCSJ and Room 419 CCSJ (computer lab) Professor Background: Dr. Ebenger received her Ph.D. in Political Science from the University of Cincinnati. Her dissertation title was Privacy, Technology and Public Policy: The Case of Electronic Mail. Her research and teaching interests include: the Internet, technology, public policy and privacy; civil rights and civil liberties; corruption in politics, and voter participation. Course Description: This course focuses on the personnel, legal, regulatory and privacy issues that constitute many of the basic management areas that must be considered in developing and implementing an effective information security program. The course examines the legal basis for privacy and security of information and related technologies. Students study the USA PATRIOT ACT, GASSP (Generally Accepted System Security Practices), security best practices, and appropriate organizational responses to risk associated with the integrity of information. Presents methods and procedures for the assessment of risk, and examines strategies for mitigation of risk involving operational procedures, political issues in the organization, and the implementation of an enterprise wide security strategy. This class is reading and writing intensive, exactly what you d expect in a master s level class. The fact that the course is in an accelerated format does not change the standards expected of master s students. 1

Learning Objectives: At the end of the course, the student will know and comprehend the fundamental principles and concepts of information security including the Common Body of Knowledge develop a basic knowledge of computer hardware, Internet and security architecture, and related security software recognize and distinguish between risks, threats and vulnerabilities on/to information systems understand the legal and ethical aspects of information systems security be able to analyze and evaluate the effectiveness of security strategies/plans of information systems oversee the development and implementation of practical strategies/plans to secure information systems Textbooks: Security: Information Security: Principles and Practices, Mark Merkow and Jim Breithaupt, 2006. Information Security: Contemporary Cases, Marie Wright and John Kakalik, 2007 The Art of Deception, Kevin Mitnick, 2002 Dictionary of Computer and Internet Terms, Barron s Business Guides, 11 th edition, 2013. Assessment: Exercises/Projects (5, 3pts. each) Group Project/Presentation Three Papers (15pt. each) Class Participation 15% of grade 30% of grade 45% of grade 10% of grade 100% 2

Class Policy for Assignments: Exercise/Project Assignments: Each week, there will be a set of exercises or projects assigned for that reading assignment (see Schedule of Readings, pp. 5-7). Note that each chapter has Exercises and Projects but you will only be assigned one or the other. Make sure you are doing the right assignment. If an exercise is assigned, it should be one-half page, at a minimum, and the projects should be one page, at a minimum. Each paper should be typed, double-spaced, 12 pt. font, and are DUE the date they are discussed in class. There are several in-class assignments noted on the syllabus. They are exactly what they say they are: we will complete the assignments in the computer lab here at CCSJ. You do not need to do anything prior to the assignment other than look it over and ask any questions you have about them in class. There are also three papers due for this class. The questions to be answered in these papers are: Paper #1 The CIA triad - confidentiality, integrity and availability - are goals for information security. Discuss each one and give instances where one goal would be more important than the other. How would you guarantee confidentiality, integrity or availability in your examples? DUE May 14. Paper #2 Create a fictitious company and create a complete business continuity plan (BCP) and a disaster recovery plan (DRP). Project 6.1, p. 138 DUE May 28. Paper #3 Of the 10 domains of common body of knowledge for Information Security, which do you believe is the most significant? Give reasons for your answer, as well as summarize that particular domain. DUE June 11. These papers should be 3-5 pages in length. They must be typed, 12 pt. font, and double-spaced. Also, THEY MUST BE IN YOUR OWN WORDS. DO NOT CUT AND PASTE, OR COPY FROM THE BOOK WITHOUT PROPER CITATION. ANY PAPER CONTAINING SOMEONE ELSE S WORDS WITHOUT PROPER CITATION (PLAGIARISM) WILL BE RETURNED WITH AN F GRADE. If any student is caught plagiarizing any assignment, they will receive an F for that assignment and will receive no higher than a C for the course. 3

Also, it is advised that students complete the self-test at the end of each chapter. It will not be graded but it is a good way to review the material in the chapter and to make sure you have grasped the main points. Group Project/Presentation: Students will be divided into groups of four (4) and will be assigned a project. The project will consist of a case study of a company, school, retail establishment, public library, or a place of your choosing. The name of the establishment where you are doing your case study is due the second week of class, Thursday, May 14, 2015. The case study should include: the size (the physical location as well as number employees); the products made/sold or the services provided; what information is stored and how; the methods by which the information is secured; the problems they have been faced with and how they have dealt with them. (A handout with specific questions will be provided the first day of class so you have a template to work from.) You will conclude with an evaluation of the security procedures in place, any problems you foresee, and suggestions to address these problems. Each group will present their project to the class during the last class of the course (Thursday, June 18, 2015) and submit a paper (7-10 pages, and no less than 7 pages) regarding their findings. Class Policy on Attendance: As this is an accelerated course, attendance is crucial. Therefore, one excused absence will be accepted; however, two absences, regardless of it being workrelated, excused, etc., will result in a grade of no higher than a B for the course. It is suggested that if you cannot attend the full amount of classes at this time, you withdraw from the program and re-enroll when you can commit more time and effort to your studies. Statement of Plagiarism: If an instructor or other Calumet College of St. Joseph personnel find that a student has plagiarized or been involved in another form of academic dishonesty, the instructor or other personnel may elect to bring the matter up for judicial review. The maximum penalty for any form of academic dishonesty is dismissal from the College. The procedures for judicial review are listed under the section of CCSJ handbook that addresses student grievances. Grading Scale: A: 100-93 B+: 89-87 C+: 79-77 D+: 69-67 A-: 92-90 B: 86-83 C: 76-73 D: 66-63 B-: 82-80 C-: 72-70 D-: 62-60 F: 59 & below 4

SCHEDULE OF READINGS: P&P Security: Information Security: Principles and Practices Cases Information Security: Contemporary Cases Mitnick The Art of Deception Month/Week Class Date Topics and Assignments January 1 st Thursday, May 7 P&P Chapter 1 Why Study Information Security? P&P Chapter 2 Information Security Principles of Success Cases Chapter 1 Protecting Employee Data ASSIGNMENT Exercise 2.5 (p. 37) In class assignment Exercise 2.1 and Project 2.1 (pgs. 36-37) P&P Chapter 3 Certification Programs and the Common Body of Knowledge Groups Assigned 2 nd Thursday, May 14 P&P Chapter 4 Security Management ASSIGNMENT CHOOSE ONE: Exercise 4.1, OR 4.2 OR 4.3 (p. 86) P&P Chapter 5 Security Architecture and Models Group Project Locations Due PAPER #1 DUE 5

Month/Week Class Date Topics and Assignments January 3 rd Thursday, May 21 P&P Chapter 6 Business Continuity Planning and Disaster Recovery Planning Security YouTube Video - http://www.youtube.com/watch?v=z8i3ntg-zxw Cases Chapter 3 Contingency Planning P&P Chapter 7 Law, Investigations, and Ethics ASSIGNMENT Exercise 7. 5 (p. 162) Guest Speaker Sgt. James Washburn, retired CPD, OCD 4 th Thursday, May 28 P&P Chapter 8 Physical Security Control Cases Chapter 2 Integrating IT and Physical Security ASSIGNMENT Project 8.3 (p. 186) P&P Chapter 9 Operations Security IN CLASS ASSIGNMENT - Exercise 9.1 and 9.3 P&P Chapter 10 Access Control Systems and Methodology IN CLASS ASSIGNMENT Password Cracking February 5 th Thursday, June 4 Paper #2 DUE Mitnick (read Part I, skim Part II, read Part III and Part IV) P&P Chapter 11 Cryptography Cases Chapter 6 Tracking a Computer Intruder ASSIGNMENT Exercise 11.1 and 11.6 (p. 253 and 254) Video History of Hacking 6

Month/Week Class Date Topics and Assignments February 6 th Thursday, June 11 P&P Chapter 12 Telecommunications, Network, and Internet Security Cases Chapter 7 Developing and Implementing a Successful Information Security Awareness Program P&P Chapter 13 Application Development Security P&P Chapter 14 Securing the Future Paper #3 DUE 7 th Thursday, June 18 Group Project Presentations 7