ISM527 - Cyber Security Management



Similar documents
Course Description and Outcomes. Participation & Attendance

ITS425: Ethical Hacking and Penetration Testing

SAMPLE. PJM500: Project Management. Course Description and Outcomes. Credit Hours: 3

ITS415: Principles of Cybersecurity

ISM530 Enterprise Cybersecurity

ISM542 Business Analytics

HLS300: Introduction to Homeland Security

HLS450: Intelligence. Course Description and Outcomes. Credit Hours: 3

ITS425: Ethical Hacking and Penetration Testing

MGT410 Project Management

HSM300: Introduction to Human Services

ISM540: Introduction to Business Intelligence

SAMPLE. Course Description and Outcomes

ORG579: Organizational Leadership Capstone

ITS410: Database Management

HSM405 Case Management in Human Services

PJM380: Project Management Tools

OTL532K Principles of 21st Century Learning and Design

SMB300 Small Business and Entrepreneurship

HCM370: Quality and Risk Management in Health Care Credit Hours: 3

SAMPLE. COM300: Effective Business Communication Skills: Research and Writing

PJM480: Capstone Project Management

PJM380: Project Management Tools

ORG536: Contemporary Business Writing and Communication

MKG350: Promotions, Advertising and Public Relations

How To Write A Project On Information Technology

etroy XTIA CJ 6630 Juvenile Justice Term 2, 2015

SAMPLE. ORG536: Contemporary Business Writing and Communication

IDEAL PROGRAM PRST 224 Critical Thinking & Writing SYLLABUS ONLINE

CJ 4480 Digital Forensics II Syllabus - Term

HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD Course Outline

Child Development 382 Professional Seminar in Child Development: Current Issues Fall 2016 Tuesdays 5-7:50pm in Modoc 120

BUS 454 MARKET RESEARCH AND INFORMATION

Master of Science in Information Security and Assurance

SYLLABUS FOR ADM 689. Spring 2010, Summer 2010, Fall 2010

CRIJ/BOR 4354 Professionalism & Ethics in Criminal Justice Agencies

Department of Criminal Justice CRJ 325 Incident Management and Planning

EDAD DOCTORAL WRITING I: AUTHORING THE DISSERTATION COURSE SYLLABUS: SPRING 2013

SAMPLE COURSE SYLLABUS*

etroy Abnormal Psychology 3304 TERM 1, 2015


CALIFORNIA STATE UNIVERSITY CHANNEL ISLANDS PSY494 POSITIVE PSYCHOLOGY RESEARCH FALL 2015 SYLLABUS DR. CHRISTY TERANISHI MARTINEZ

etroy SFM 6600: Foundations of Sport and Fitness Management SYLLABUS TERM 1, Fall 2015

COURSE SYLLABUS ETEC 524: Introduction to Educational Technology Spring 2013

Texas A&M University-Texarkana College of Science, Technology, Engineering & Math. COURSE CREDIT: 3 Semester Credit Hours (3-0)

etroy Course Syllabus BUS 3382 XTIA Business Communication Term 1, 2015 August 10 October 11, 2015

How To Get A Wgu Degree

Online Course Syllabus. POL 1113: American National Government. Fall 2015

HARRISBURG AREA COMMUNITY COLLEGE PSYCHOLOGY 101-GENERAL PSYCHOLOGY. Dr. Jaci Verghese. Syllabus for CRN Meeting Times: Online Instruction

ASU College of Education Department of Curriculum and Instruction EDG 6361 American Higher Education Course Syllabus

Adler Graduate School 1550 East 78th Street Richfield, MN 55423

COURSE SYLLABUS ETEC 578: Instructional Design & Development Spring 2014

Nursing Community Health Nursing

Department of Accounting Syllabus Fall 2015 ACCT E CRN: # 82569

OTTAWA ONLINE EDC-7723 Instructional Design and Evaluation

HUS 614: Communication Skills for Human Service Practitioners

II. Course Description, Overview, Objectives and Prerequisites

Master of Education, Learning and Technology

Homeland Security Graduate Programs

ASU College of Education Department of Curriculum and Instruction EDG 6331 Role of the School Counselor Fall A 2015 Course Syllabus

PRST Budgeting and Finance for Organizations COURSE SYLLABUS

CISS 492 DEA Senior Seminar in Management Information Systems

INFO 2130 Introduction to Business Computing Fall 2014

Term: Spring 2014 Course Title: Internship in Political Science Course Prefix: POSC Course No.: 4153 Section No.: P01 CRN Department of:

CS 464/564 Networked Systems Security SYLLABUS

PRST 5400/6400/7400 INSTRUCTIONAL DESIGN FOR TRAINING AND DEVELOPMENT 3 Credit Hours

Lisa K. Thompson, Ph.D., Instructor: (office); (fax); SYLLABUS Spring 2013

To talk by phone or leave a voice mail, call: (generally not available on weekends)

CJ 4475 Seminar in Cyber Security Syllabus Term

Prairie View A&M University P.O. Box 519 Mail Stop 2600 Prairie View, TX 77446

ORGL 126 Computer Information Systems COURSE SYLLABUS

ORGL 3322 Ethics, Behavior & Leadership I COURSE SYLLABUS COURSE INFORMATION


Course Syllabus. This is the easiest way to contact me.

Professor: Monica Hernandez Phone: (956) Dept. Secretary Ms. Canales

MSCJ 501 DEA Current Issues and Future Directions in Criminal Justice

Psychology 396/398: Psychology Honors Research Seminar Mondays 11:10am-12:25pm

COURSE SYLLABUS PADM Introduction to Nonprofit Organizations Fall 2015

Prairie View A & M University

Reading Materials: Required Text Book: Marjie T. Britz (2009). COMPUTER FORENSICS AND CYBER CRIME; ISBN-13: ; 2 nd

Northeastern University Online College of Professional Studies Course Syllabus

ISO/IEC 27002:2013 WHITEPAPER. When Recognition Matters

INTRODUCTION TO SMALL BUSINESS MANAGEMENT MANAGEMENT 103 (52356) 3 semester credits Summer Semester 2014

NURS 5001 Healthcare Policy 3 Credit Hours

MGMT 461 DEA Human Resource Development

Syllabus: AIT Information Systems Infrastructure Lifecycle Management

Reece, B.L., and Brandt, R. Human Relations: Principles and Practices, 7th Edition. Boston: Houghton Mifflin Company.

Semester: Fall 2015 Course Title: College Algebra Course Prefix: Math Course No.: 1113 Section No.:P36 CRN: 11830

PA 6624 XTIA Public Human Resources Management COURSE SYLLABUS TERM 2 Oct 12 Dec 13, 2015

Transcription:

ISM527 - Cyber Security Management Credit Hours: 3 Contact Hours: This is a 3-credit course, offered in accelerated format. This means that 16 weeks of material is covered in 8 weeks. The exact number of hours per week that you can expect to spend on each course will vary based upon the weekly coursework, as well as your study style and preferences. You should plan to spend 10-25 hours per week in each course reading material, interacting on the discussion boards, writing papers, completing projects, and doing research. Course Description and Outcomes Course Description: This course provides graduates with insight to the complexities with the implementation and management of cyber security in an enterprise. Students will need to perform risk assessments and recommend mitigations to protect digital assets in the workplace. Other topics in this course include: Disaster recovery, incident handling, cyber security policy implementation, as well as privacy and legal issues related to cyber security. Course Overview: Cyber security has become a topic of critical importance in today s networked and interconnected environment. The study of cyber security management describes the techniques, methods, and strategies used by information security professionals to combat security breaches and threats. This course provides an overview of the field of information security and in-depth knowledge of the complex nature of related threats and countermeasures. Students examine key strategies and methodologies used to increase business continuity and disaster preparedness. Also presented are methods of securing information systems using security controls, policies, and best practices with coverage extended to additional topics including information privacy and information security laws and regulations. Course Learning Outcomes: 1. Evaluate internal and external threats and vulnerabilities to data assets in the enterprise and provide recommendations to mitigate or eliminate areas of weakness. 2. Describe and apply the requirements to secure the physical perimeter of an enterprise. 3. Identify and explain how to respond to social engineering techniques used to compromise digital assets in an enterprise. 4. Analyze an existing enterprise infrastructure and provide a comprehensive security assessment. Participation & Attendance

Prompt and consistent attendance in your online courses is essential for your success at CSU-Global Campus. Failure to verify your attendance within the first 7 days of this course may result in your withdrawal. If for some reason you would like to drop a course, please contact your advisor. Online classes have deadlines, assignments, and participation requirements just like on-campus classes. Budget your time carefully and keep an open line of communication with your instructor. If you are having technical problems, problems with your assignments, or other problems that are impeding your progress, let your instructor know as soon as possible. Course Materials Textbook Information is located in the CSU-Global Booklist on the Student Portal. Course Schedule Due Dates The Academic Week at CSU-Global begins on Monday and ends the following Sunday. Discussion Boards: The original post must be completed by Thursday at 11:59 p.m. MT and Peer Responses posted by Sunday 11:59 p.m. MT. Late posts may not be awarded points. Mastery Exercises: Students may access and retake mastery exercises through the last day of class until they achieve the scores they desire. Critical Thinking Activities: Assignments are due Sunday at 11:59 p.m. MT. Week # 1 2 3 4 5 6 7 8 Readings Assignments Chapter 1 in Management of Information Security Discussion (25 points) Critical Thinking (120 points) Chapters 2 & 3 in Management of Information Security Discussion (25 points) Chapters 4 & 5 in Management of Information Security Discussion (25 points) Critical Thinking (120 points) Chapters 6 & 7 in Management of Information Security Discussion (25 points) Mastery (20 points) Chapters 8 & 9 in Management of Information Security Discussion (25 points) Critical Thinking (110 points) Chapter 10 in Management of Information Security Discussion (25 points) Chapter 11 in Management of Information Security Discussion (25 points) Chapter 12 in Management of Information Security Discussion (25 points) Mastery (20 points) Portfolio (350 points)

Assignment Details This course includes the following assignments/projects: Module 1 Critical Thinking: Case Analysis of Security Breaches (120 Points) In the digital world, information security is critical to the success and health of any organization. Any security breach, even a small, one can have devastating consequences. Using the Internet, find two recent examples in which organizations have experienced security breaches. Then describe and analyze both cases, offering solutions that would have prevented each breach. Your essay should account for each of the following items: 1. Provide a description and overview of the incident. 2. Describe what led to or allowed the breach to occur. 3. Explain how vulnerabilities allowed the breach to occur. 4. Explain what could have been done to prevent the breach. 5. Describe the changes or actions would you recommend the two organizations implement going forward to prevent similar attacks in the future. Discuss concepts from the Module 1 materials that apply to the security breaches that you identified and cite the assigned readings for Module 1 at least one time. Also cite at least one additional credible or scholarly source to support your analysis and positions. The CSU-Global Library is a good place to find scholarly sources. Your paper should be 2-3 pages in length with document and citation formatting per CSU-Global Guide to Writing and APA Requirements. Module 3 Critical Thinking: Drafting a Security Policy (120 Points) Security policies are common within organizations that focus on providing secure computing environments. Assume that you are tasked with drafting a security policy for an existing or fictitious organization. If fictitious, make sure the specifics of the organizations are based on research or experience. You can view some sample policies at: http://www.sans.org/security-resources/policies/. For this assignment, submit a working draft of one of the three types of security policies listed below. 1. Acceptable use policy (AUP) 2. Risk assessment policy 3. Remote access policy Preface your policy draft with a brief description of the organization. Then describe and justify the need for key elements required for the policy as they apply to your organization. Make sure that the specific elements discussed an analyzed in the policy draft align with the needs and requirements that were specified for the organization. Discuss and cite the assigned readings for Module 3 and at least one additional credible or scholarly source to support your analysis and positions. The CSU-Global Library is a good place to find scholarly sources. Your paper should be 2-3 pages in length with document and citation formatting per CSU-Global Guide to Writing and APA Requirements.

Module 5 Module 8 Critical Thinking: Security Analysis of a Case Study (110 Points) Security vulnerabilities include system bugs, irregularities, and other issues that provide mechanisms for exploitation and unintended system use. The larger and more complex a system is, the greater the likelihood that vulnerability exists. Sony, for example, is a well-recognized player in the electronics and, music recording industries. Yet in 2011 the company was subject to various security breaches as a result of system/device vulnerabilities. Use the Internet and/or CSU-Global Library resources to research the 2011 security breaches experienced by Sony. Then write a paper that accounts for each of the following items: 1. Describe the security breaches experienced by Sony in 2011. 2. Describe the economic consequences. 3. Describe and explain some non-economic consequences. 4. Discuss how the organization s reputation and brand were affected. 5. Describe what Sony did to restore customer confidence and address the security issues that allowed the breaches. 6. Analyze Sony s previous and current security practices and evaluate the company s response to this security breach. Cite at last two credible sources, online or in print, to document your description of the Sony case and discuss and cite the assigned readings for Module 5 and at least one additional credible or scholarly source to support your analysis and positions. The CSU-Global Library is a good place to find scholarly sources. Your paper should be 2-3 pages in length with document and citation formatting per CSU-Global Guide to Writing and APA Requirements. Portfolio Project: Organizational Risk & Security Plan (350 Points) Scenario Assume you serve as an IT Security intern for a military defense contractor called Military Delivery Logistics (MDL), which is based in Washington, D.C. Because your organization contracts with the U.S. military, the organization is required to perform regular risk and security assessments on all of its systems. Senior management at MDL have determined that the existing risk and security management plan for the organization is out of date and that a new risk management plan needs to be developed in compliance with strict military and Department of Defense (DoD) requirements. Because of the importance of risk management to the organization, senior management is committed to, and supportive of, the project to develop a new plan. You have been assigned to develop this new plan. The risk & security management plan will consist of a number of different sections. You have been asked to draft the Business Continuity section. Directions Draft the business continuity section of the risk and security plan. Assume that MDL has five terabytes (5 TB) of data that needs to be accessible immediately following any disaster or security incident. Apply what you have learned throughout this course in accounting for the following items as key parts of your plan: 1. Describe the business and the risk and security issues associated with the organization, which will require that you contrive that you contrive particulars for the fictional organization to the degree necessary.

2. Explain how to recover business operations while efforts are ongoing to restart previous operations. 3. Identify and analyze potential vendor partnerships that need to be in place to ensure a speedy recovery and business continuity. 4. Describe a testing plan to correct any issues with the continuity plan. Discuss and cite at least three credible or scholarly sources other than the assigned readings to support your analysis and positions. You may also cite assigned readings as applicable. The CSU-Global Library is a good place to find scholarly sources. Your paper should be 8-10 pages in length with document and citation formatting per CSU- Global Guide to Writing and APA Requirements. Helpful Resources ISO/IEC 22399:2007 Guideline for incident preparedness and operational continuity management. ISO/IEC 24762:20082:2008 Guidelines for information and communications technology disaster recovery services. Course Grading Grading Scale and Policies 20% Discussion Participation A 95.0 100 10% Mastery Exercises 35% Critical Thinking Activities A- 90.0 94.9 35% Final Portfolio Paper B+ 86.7 89.9 B 83.3 86.6 B- 80.0 83.2 C+ 75.0 79.9 C 70.0 74.9 D 60.0 69.9 F 59.9 or below In-Classroom Policies For information on late work and Incomplete grade policies, please refer to our In-Classroom Student Policies and Guidelines or the Academic Catalog for comprehensive documentation of CSU-Global institutional policies. Academic Integrity Students must assume responsibility for maintaining honesty in all work submitted for credit and in any other work designated by the instructor of the course. Academic dishonesty includes cheating, fabrication, facilitating academic dishonesty, plagiarism, reusing /re-purposing your own work (see CSU-Global Guide to Writing and APA Requirements for percentage of repurposed work that can be used in an assignment), unauthorized possession of academic materials, and unauthorized collaboration. The CSU-Global Library provides information on how students can avoid plagiarism by understanding what it is and how to use the Library and Internet resources. Citing Sources with APA Style All students are expected to follow the CSU-Global Guide to Writing and APA Requirements when citing in APA (based on the APA Style Manual, 6th edition) for all assignments. For details on CSU-Global APA style, please review the APA resources within the CSU-Global Library under the APA Guide & Resources link. A link to this document should also be provided within most assignment descriptions on your course s Assignments page.

Netiquette Respect the diversity of opinions among the instructor and classmates and engage with them in a courteous, respectful, and professional manner. All posts and classroom communication must be conducted in accordance with the student code of conduct. Think before you push the Send button. Did you say just what you meant? How will the person on the other end read the words? Maintain an environment free of harassment, stalking, threats, abuse, insults or humiliation toward the instructor and classmates. This includes, but is not limited to, demeaning written or oral comments of an ethnic, religious, age, disability, sexist (or sexual orientation), or racist nature; and the unwanted sexual advances or intimidations by email, or on discussion boards and other postings within or connected to the online classroom. If you have concerns about something that has been said, please let your instructor know.