CENTRAL TEXAS COLLEGE ITSY 2459 SECURITY ASSESSMENT AND AUDITING Semester Hours Credit: 4 INSTRUCTOR: OFFICE HOURS: I. INTRODUCTION A. Capstone experience for the security curriculum. Synthesizes technical material covered in prior courses to monitor, audit, analyze, and revise computer and network security systems to ensure appropriate levels of protection are in place to assure regulatory compliance. B. This course serves as a required or elective course on various degree plans. Curriculum plans for degrees and certificates are listed in the current Central Texas College catalog. C. The delivery method of this course may be traditional lecture/lab, blended lecture/lab, or online. D. Prerequisites: Twelve (12) semester hours of Information Technology Security (ITSY) coursework. II. LEARNING OUTCOMES Upon successful completion of this course, Security Assessment and Auditing, the student will be A. Review security plan to ensure appropriate level of protection. (C5, C6, C8, C15, C19, C20). B. Assess network security design. (C1, C5, C6, C8, C19, C20, F1, F3, F8, F9, F12). C. Audit network system based on security design. (C1, C5, C6, C8, C19, C20, F1, F3, F8, F9, F12). D. Use relevant tools to assure security requirements. (C5, C6, C8, C15, C19, C20). E. Review all security policies and procedures on a regular basis. (C1, C5, C6, C8, C19, C20, F1, F3, F8, F9, F12). October 2014
III. INSTRUCTIONAL MATERIALS A. The instructional materials identified for this course are viewable through www.ctcd.edu/books B. Lecture Classes also require at least one USB storage device. Online students may use cloud based storage. IV. COURSE REQUIREMENTS A. Attend both lecture and lab or in the case of online delivery, be actively engaged in Blackboard and maintain constant progress. B. Be prepared to participate in discussion, team projects/assignments and take unannounced assessments relating to the lecture materials. C. Complete all exams/assessments. D. Submit all assignments on time. V. ASSESSMENTS A. Student content mastery will be evaluated in the following areas: Assessments (midterm exam, quizzes, projects, discussion etc.) Final Assessment (final exam and/or semester project, participation) B. Scheduled and unscheduled assessments will be given at the discretion of the instructor. C. Exams/assessments may be composed of both subjective and objective questions plus computer output. D. A student must take all exams/assessments. Both online and on campus students who know in advance that they will be absent due to school sponsored trips, military duty or orders, or any other valid reason, must arrange to take an early exam/assessment. Unexpected absences due to illness or other extenuating circumstances will require the student to contact the instructor about make-up work in lieu of the missed exam/assessment. E. Students with unexcused absences will be given a zero for each missed assignment. ITSY 2459 2
VI. SEMESTER GRADE COMPUTATION Course Requirements Points Points Grade Quality Points Assignments 300 900-1000 A-Superior 4 Assessments 300 800-899 B-Above Average 3 Final Assessment 400 700-799 C-Average 2 600-699 D Passing but 1 Unsatisfactory TOTAL 1000 0-599 F-Failure 0 VII. NOTES AND ADDITIONAL INSTRUCTIONS FROM THE INSTRUCTOR A. Course Withdrawal: It is the student s responsibility to officially withdraw from a course if circumstances prevent attendance. Any student who desires to, or must, officially withdraw from a course after the first scheduled class meeting must file a Central Texas College Application for Withdrawal (CTC Form 59). The student must sign the withdrawal form. CTC Form 59 will be accepted at any time prior to Friday of the 12th week of classes during the 16-week fall and spring semesters. The deadline for sessions of other lengths is: 10-week session Friday of the 8th week 8-week session Friday of the 6th week 5-week session Friday of the 4th week The equivalent date (75% of the semester) will be used for sessions of other lengths. The specific last day to withdraw is published each semester in the Schedule Bulletin. For non-goarmyed active military students, the effective date of withdrawal is the filing date with the Education Center. For all other students, the effective date of withdrawal is the date that the withdrawal application is received by the Central Texas College representative. Students who used financial aid, military tuition assistance, VA benefits, or other non-personal funds may be required to repay tuition and fees to the funding agency. For specific repayment requirements, contact the Office of Student Financial Aid or Veterans Services Office before withdrawing. Military tuition assistance students should visit their military Education Center or Navy College Office. A student who officially withdraws will be awarded the grade of W provided the student s attendance and academic performance are satisfactory at the time of official withdrawal. Students must file a withdrawal application with the College before they may be considered for withdrawal. ITSY 2459 3
A student may not withdraw from a class for which the instructor has previously issued a grade of F, FI, FN, IP, or XN. B. Instructor Initiated Withdrawals: Faculty are authorized to withdraw students who are not making satisfactory course progress to include failure to meet College attendance requirements as outlined in the section of the Catalog entitled Satisfactory Progress Standards. The instructor will assign the appropriate grade on CTC Form 59 for submission to the registrar. Students enrolled in distance learning courses are expected to maintain constant progress throughout the course. Failure to do so may result in the student being administratively withdrawn by the instructor. Students who have not attended class by the 12th class day of a 16-week course or the 6th class day of an 8-week term may be administratively withdrawn by the instructor with a grade of "W." Students may also be administratively withdrawn from any class when their absences exceed a total of four class meetings for a 16-week course or three class meetings for less than 16-week courses and; in the opinion of the instructor, the student cannot satisfactorily complete the course. In a distance learning course the last date of attendance is the last activity by the student in the course. C. Administrative Withdrawal: A student may be administratively withdrawn by a designated member of the administrative staff of the College when the student has been placed on Academic Suspension or Disciplinary Suspension; the student has an outstanding financial obligation owed to the college; or the student registered for a course without the required prerequisite or departmental permission. The College is under no obligation to refund tuition and fees, or other costs associated with an administrative or instructor initiated withdrawal. D. Incomplete Grade: The College catalog states, An incomplete grade may be given in those cases where the student has completed the majority of the coursework but, because of personal illness, death in the immediate family, or military orders, the student is unable to complete the requirements for a course... Prior approval from the instructor is required before the grade of IP for Incomplete is recorded. E. Cell Phones and Pagers: Students will silence cell phones and mobile devices while in the classroom or lab. F. Americans with Disabilities Act (ADA): Disability Support Services provide services to students who have appropriate documentation of a disability. Students requiring accommodations for class are responsible for contacting the Office of Disability Support Services (DSS) located on the central campus. This ITSY 2459 4
service is available to all students, regardless of location. Review the website at www.ctcd.edu/disability-support for further information. Reasonable accommodations will be given in accordance with the federal and state laws through the DSS office. G. Instructor Discretion: The instructor reserves the right of final decision in course requirements and may make changes to the course outline and/or assignments as needed. H. Civility: Individuals are expected to be aware of what a constructive educational experience is and be respectful of those participating in a learning environment. Failure to do so can result in disciplinary action up to and including expulsion. I. Degree Progression: Students who receive a grade of D are advised not to enroll in the next course for which this course was a prerequisite. J. Failing Grade: The grade of F or FN will be given for academic failure, non-attendance or scholastic dishonesty. K. Scholastic Honesty: All students are expected to maintain the highest standards of scholastic honesty in the preparation of all course work and during examinations. The college policy on scholastic honesty, including definitions on plagiarism, collusion, and cheating can be found at the following URL: http://online.ctcd.edu/plagiarism.cfm ITSY 2459 5
VIII. COURSE OUTLINE A. Unit One: Introduce course requirements and objectives and lab orientation a. Apply course requirements and objectives as defined in the syllabus and reviewed by the instructor 2. Learning Activities a. Read syllabus (C5, F1) b. Read and analyze assignments (C5, C6, F1, F9, F11, F12) a. Discuss syllabus b. Cover functional units of a computer c. Cover hardware and software fundamentals d. Conduct laboratory demonstration B. Unit Two: The Need for Information Systems Security Compliance a. Examine the role of an IT assessment. b. Examine the role of IT auditing. c. Compare the difference between and audit and an assessment. d. Summarize compliance and explain why it is important. 2. Learning Activities a. What is a security assessment and audit? b. What is the importance of governance and compliance? C. Unit Three: Overview of U. S. Compliance Laws a. Describe the goals and requirements for key acts of Congress. b. Understand Department of Defense requirements and the importance of information assistance. c. Describe the goals and requirements of the payment card industry Data Security Standard. ITSY 2459 6
d. Describe various regulations concerning protection of health, accounting, and other information. 2. Learning Activities a. The Role of Planning b. Precursors to Planning c. Strategic Planning d. Planning for Information Security Implementation D. Unit Four: What is the Scope of and IT Compliance Audit? a. Understand what organizations need to do to achieve and maintain compliance. b. Explain why protecting privacy data is important or achieving compliance. c. Understand the process for selecting security controls. d. Compare the different domains of IT infrastructure. 2. Learning Activities a. Contingency Planning definition b. Components of Contingency Planning c. Business Resumption Planning d. Testing Contingency Plans E. Unit Five: Auditing Standards and Frameworks a. Understand the importance of using a framework for audits. b. Describe various strategies for using standards and framework for compliance auditing. c. Understand COSO and how it relates to information technology. d. Describe the key parts and importance of COBIT. e. Understand the importance of and benefits of a SAS 70 audit ITSY 2459 7
f. Describe the key ISO.IEC standards that relate to information security g. Describe the NIST 800-53 and 800-53A standards h. Understand the need for hybrid auditing approaches a. Read chapter (C5, C6, C8, C19, F1, F5, F11) b. Complete case studies (C5, C6, C8, C19, F1, F5, F11) a. Enterprise Information Security Policy b. Issue-Specific Security Policy c. System-Specific Policy d. Guidelines for Policy Development F. Unit Six: Planning an IT Infrastructure Audit for Compliance a. Understand how to define the scope and frequency of an audit b. Identify the key requirements of an Audit c. Understand the importance of risk management in assessing security controls d. Understand information and resources needed for an IT audit e. Relate the IT security policy framework into the seven domains of IT infrastructure f. Understand why monitoring requirements help with an IT audit g. Identify security control points h. Differentiate between the project management tasks of an IT audit a. Read and discuss chapter (C5, C6, F1, F5, F11) a. Organizing for Security. b. Placing Information Security within an Organization. c. Components of the Security Program. d. Information Security Roles and Titles. e. Implementing Security Education, Training, and Awareness Programs. G. Unit Seven: Conducting and IT Infrastructure Audit for Compliance a. Understand the elements of conducting and audit of IT infrastructure. ITSY 2459 8
b. Recognize strategies to manage risk and provide baseline configurations to control risk. c. Understand why conducting a gap analysis is important d. Recognize when it is necessary to conduct an audit taking a layere4d approach e. Evaluate different methods and techniques for performing an IT security assessment f. Understand how a security assessment fits into the audit process g. Identify different types of tools used to enable an audit h. Recognize the value of monitoring and configuration management to the audit process i. Articulate a methodology to testing security controls j. Identify common issues that might hamper the audit efforts k. Understand safeguards necessary for security operations and administration roles a. Security Management Models. b. Security Management Practices. c. Metrics in Information Security Management. d. Emerging Trends in Certification and Accreditation. H. Unit Eight: Writing the IT Infrastructure Audit Report a. Design the layout for a proper executive summary b. Understand audit findings and their importance to the audit report c. Understand the gap analysis and its importance to the audit report d. Identify the risk components part of an IT security assessment and audit report e. Understand how IT security controls identified in the IT audit report relate to the security policy framework and protection of privacy data f. Identify key areas from which a gap analysis should be documented g. Understand how to report upon a compliance assessment h. Understand how to craft meaningful compliance recommendations ITSY 2459 9
a. Risk Management. b. Risk Identification. c. Risk Assessment. d. Documenting the Results of Risk Assessment I Unit Nine: Compliance within the User Domain a. Examine the compliance law requirements and business drivers b. Compare how items found in the User Domain contribute to compliance c. Describe methods of ensuring compliance in the User Domain d. Summarize best practices for User Domain compliance a. Risk Control Strategies b. Managing Risk c. Feasibility Studies and Cost-Benefit Analysis d. Recommended Risk Control Practices e. The OCTAVE Method f. Microsoft Risk Management Approach J. Unit Ten: Compliance within the Workstation Domain a. Examine compliance law requirements and business drivers b. Compare how devices and components found in the workstation Domain contribute to compliance c. Describe methods of ensuring compliance in the workstation Domain d. Summarize best practices for Workstation Domain compliance a. Access Controls ITSY 2459 10
b. Firewalls. c. Intrusion Detection Systems. d. Remote Access Protection. e. Wireless Network Protection. f. Scanning and Analysis Tools. g. Cryptography. K. Unit Eleven: Compliance within the LAN Domain a. Examine compliance law requirements and business drivers b. Compare how devices and components found in the Workstation Domain contribute to compliance c. Describe methods of ensuring compliance within the LAN Domain d. Summarize best practices for Workstation Domain compliance a. Access Controls b. Authentication c. Authorization L Unit Twelve: Compliance within the Lan-to-Wan Domain a. Examine compliance law requirements and business drivers b. Compare how devices and components found in the Lan-to-Wan Domain contribute to compliance c. Describe methods of ensuring compliance in the Lan-to-Wan Domain d. Summarize best practices for Lan-to-Wan Domain compliance 3. Unit Outline: Follow the learning activities a. Staffing the Security Function b. Qualifications and Requirements c. Entering the Information Security Profession ITSY 2459 11
M. Unit Thirteen: Compliance within the WAN Domain a. Examine compliance law requirements and business drivers b. Compare how devices and components found in the WAN Domain contribute to compliance c. Describe methods of ensuring compliance in the WAN Domain d. Summarize best practices for WAN Domain compliance requirements a. Law and Ethics in Information Security b. The Legal Environment. c. Ethical Concepts in Information Security. d. Professional Organizations and their Codes of Ethics. e. Organizational Liability and the Need for Counsel.\ N. Unit Fourteen: Compliance within the Remote Access Domain a. Examine compliance law requirements and business drivers b. Compare how devices and components found in the Remote Access Domain contribute to compliance c. Describe methods of ensuring compliance in the Remote Access Domain d. Summarize best practices for WAN Domain compliance requirements a. Law and Ethics in Information Security b. The Legal Environment. c. Ethical Concepts in Information Security. d. Professional Organizations and their Codes of Ethics. e. Organizational Liability and the Need for Counsel. ITSY 2459 12
O. Unit Fifteen: Compliance within the System/Application Domain a. Examine compliance law requirements and business drivers b. Compare how devices and components found in the Systems/Application Domain contribute to compliance c. Describe methods of ensuring compliance in the System/Application Domain d. Summarize best practices for WAN Domain compliance requirements a. Law and Ethics in Information Security b. The Legal Environment. c. Ethical Concepts in Information Security. d. Professional Organizations and their Codes of Ethics. e. Organizational Liability and the Need for Counsel. P. Unit Sixteen: Ethics, Education, and Certification for IT Auditors a. Understand the required skills and knowledge required for a career in IT auditing b. Understand what makes up a code of conduct and a code of ethics c. Identify codes of Ethics for various professional organizations d. Identify the components that make up a mature code of conduct and why organizations establish them e. Understand the differences between auditing associations and other professional bodies f. Differentiate between certifications available to auditors and IT professionals g. Identify educational opportunities and resources available to IT auditors ITSY 2459 13
a. Law and Ethics in Information Security b. The Legal Environment. c. Ethical Concepts in Information Security. d. Professional Organizations and their Codes of Ethics. e. Organizational Liability and the Need for Counsel. ITSY 2459 14