ISM530 Enterprise Cybersecurity



Similar documents
ITS415: Principles of Cybersecurity

Course Description and Outcomes. Participation & Attendance

ISM527 - Cyber Security Management

HLS450: Intelligence. Course Description and Outcomes. Credit Hours: 3

MGT410 Project Management

ITS425: Ethical Hacking and Penetration Testing

HLS300: Introduction to Homeland Security

ISM542 Business Analytics

SAMPLE. PJM500: Project Management. Course Description and Outcomes. Credit Hours: 3

ISM540: Introduction to Business Intelligence

HSM300: Introduction to Human Services

ITS425: Ethical Hacking and Penetration Testing

SAMPLE. Course Description and Outcomes

ORG579: Organizational Leadership Capstone

HSM405 Case Management in Human Services

ITS410: Database Management

PJM380: Project Management Tools

OTL532K Principles of 21st Century Learning and Design

HCM370: Quality and Risk Management in Health Care Credit Hours: 3

SMB300 Small Business and Entrepreneurship

SAMPLE. COM300: Effective Business Communication Skills: Research and Writing

PJM480: Capstone Project Management

PJM380: Project Management Tools

ORG536: Contemporary Business Writing and Communication

MKG350: Promotions, Advertising and Public Relations

How To Write A Project On Information Technology

CRIJ/BOR 4354 Professionalism & Ethics in Criminal Justice Agencies

SAMPLE. ORG536: Contemporary Business Writing and Communication

Department of Accounting Syllabus Fall 2015 ACCT E CRN: # 82569

OTTAWA ONLINE EDC-7723 Instructional Design and Evaluation

IDEAL PROGRAM PRST 224 Critical Thinking & Writing SYLLABUS ONLINE

CJ 4480 Digital Forensics II Syllabus - Term

HARRISBURG AREA COMMUNITY COLLEGE PSYCHOLOGY 101-GENERAL PSYCHOLOGY. Dr. Jaci Verghese. Syllabus for CRN Meeting Times: Online Instruction

NURS 5001 Healthcare Policy 3 Credit Hours

BUS 454 MARKET RESEARCH AND INFORMATION

CISS 493 A Senior Seminar in Computer Information Systems

CONCORDIA UNIVERSITY CHICAGO ONLINE SYLLABUS TEMPLATE

CS 464/564 Networked Systems Security SYLLABUS

CJ 4475 Seminar in Cyber Security Syllabus Term

COMM 110: Fundamentals of Public Speaking (3 Credits) Course Description

COURSE SYLLABUS ETEC 524: Introduction to Educational Technology Spring 2013

CISS 492 DEA Senior Seminar in Management Information Systems

English 1302 Writing Across the Curriculum Fall 2015

OTTAWA ONLINE BUS Management Information Systems

etroy SFM 6600: Foundations of Sport and Fitness Management SYLLABUS TERM 1, Fall 2015

COURSE SYLLABUS PADM Introduction to Nonprofit Organizations Fall 2015

ORGL 126 Computer Information Systems COURSE SYLLABUS

Master of Science in Information Security and Assurance

BUS 373 ORGANIZATIONAL BEHAVIOR Syllabus Fall 2015


etroy Course Syllabus BUS 3382 XTIA Business Communication Term 1, 2015 August 10 October 11, 2015

MGMT 338 A International Business

COURSE SYLLABUS ETEC 578: Instructional Design & Development Spring 2014

OTTAWA ONLINE ECE Early Childhood Math Methods

PHOENIX COLLEGE ONLINE. SBS220 Internet Marketing for Small Business

PRST 5400/6400/7400 INSTRUCTIONAL DESIGN FOR TRAINING AND DEVELOPMENT 3 Credit Hours

CRIJ 1301 Introduction to Criminal Justice Course Syllabus: Summer 2015

English 1302 Writing Across the Curriculum Spring 2016

Central Michigan University College of Business Administration Online MBA Program. MBA 620 Online: Managerial Accounting: A Management Perspective

SOCIOLOGY OF VIOLENCE SOCI 3360 Fall Semester, 2013 Online Course

Human Resource Management

etroy Abnormal Psychology 3304 TERM 1, 2015

Adler Graduate School 1550 East 78th Street Richfield, MN 55423

Brazosport College Syllabus for Criminology (CJSA 1325) Spring 2014 (Online)

HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD Course Outline

ORGL 3322 Ethics, Behavior & Leadership I COURSE SYLLABUS COURSE INFORMATION

School of Management MGMT315 Management Communications 3 Credit Hours 8 weeks Prerequisite(s): None

Course Title: ARE Curriculum in Teaching Art (Web) Term: Fall 2014 Credits: 3

DEPARTMENT OF SOCIOLOGY AND CRIMINAL JUSTICE SOCIAL SCIENCE BUILDING 1000 CHASTAIN ROAD KENNESAW, GA

USF Sarasota-Manatee College of Business Information Technology CGS Credit Hours Computers in Business Fall 2015, USF Sarasota-Manatee

HCC ONLINE COURSE REVIEW RUBRIC

PRST 5400/6400/ Instructional Design for Training and Development 3 Credit Hours

Ogeechee Technical College One Joe Kennedy Blvd. Statesboro, Georgia Syllabus English 2130 American Literature

EDAD DOCTORAL WRITING I: AUTHORING THE DISSERTATION COURSE SYLLABUS: SPRING 2013

EMM 210 FIELD STUDY IN EMERGENCY MANAGEMENT

COURSE DELIVERY METHOD

EDAD 695 Research Methodology 01W Course Syllabus Fall Ed Leadership Office: Education North 105, P.O. Box 3011 Commerce, Texas 75429

For computer access, the NEU library can be used 7 days a week: Required Textbook(s)/Materials

CISS 492 A Senior Seminar in Management Information Systems

Spring 2015 Syllabus for ENG : Writing Experience I

Business Computer Applications CGS 1100 Course Syllabus. Course Title:

ITNW 1337 Introduction to the Internet Course Syllabus: Spring 2015

GEB Writing in Business Fall 2015

etroy XTIA CJ 6630 Juvenile Justice Term 2, 2015

Reading Materials: Required Text Book: Hall, J. & Singleton, T. Information Technology Auditing and Assurance, 4th Edition.

Project Management Tools and Leadership (MIS3886) Spring 2016 Course Syllabus

PSYC 414 COGNITIVE PSYCHOLOGY

Reading Materials: Required Text Book: Marjie T. Britz (2009). COMPUTER FORENSICS AND CYBER CRIME; ISBN-13: ; 2 nd

CS3332 Software Engineering I. Term III/2016

SOC W: GLB/US Social Problems COURSE SYLLABUS Spring 2016

Transcription:

ISM530 Enterprise Cybersecurity Credit Hours: 3 Contact Hours: This is a 3-credit course, offered in accelerated format. This means that 16 weeks of material is covered in 8 weeks. The exact number of hours per week that you can expect to spend on each course will vary based upon the weekly coursework, as well as your study style and preferences. You should plan to spend 10-25 hours per week in each course reading material, interacting on the discussion boards, writing papers, completing projects, and doing research. Course Description and Outcomes This course provides students with insight into the cybersecurity issues surrounding an enterprise. These include securing organizational data, responding to cyber- based security breaches, emerging technologies, and ensuring a secured computing environment for safeguarding company information. The course reviews the network security and cryptographic techniques that are currently being used. The nuances involved in defining cybersecurity strategies and complying with security standards to ensure governance are also discussed. Course Learning Outcomes: 1. Analyze possible threats to organizational data and recommend course(s) of action to mitigate cybercrime attacks. 2. Evaluate different authentication methodologies to provide solutions to secure information assets. 3. Explain how authentication is used with cryptography to secure information access. 4. Demonstrate the ability to recognize e and communicate threats to organizational information assets. 5. Analyze and evaluate the commitment of foreign governments for the expansion of nationally owned telecommunications services for the support of business and government technologies. Participation & Attendance Prompt and consistent attendance in your online courses is essential for your success at CSU-Global Campus. Failure to verify your attendance within the first 7 days of this course may result in your withdrawal. If for some reason you would like to drop a course, please contact your advisor. Online classes have deadlines, assignments, and participation requirements just like on-campus classes. Budget your time carefully and keep an open line of communication with your instructor. If you are having technical problems, problems with your assignments, or other problems that are impeding your progress, let your instructor know as soon as possible. Course Materials

Textbook Information is located in the CSU-Global Booklist on the Student Portal. Course Schedule Due Dates The Academic Week at CSU-Global begins on Monday and ends the following Sunday. Discussion Boards: The original post must be completed by Thursday at 12 midnight MT and Peer Responses posted by Sunday 12 midnight MT. Late posts may not be awarded points. Mastery Exercises: Students may access and retake mastery exercises through the last day of class until they achieve the scores they desire. Critical Thinking Activities: Assignments are due Sunday at 12 midnight MT. Week # 1 2 3 4 5 6 Readings Chapters 1 & 2 in Principles of Information Systems Grossman, J. (2013). The web won't be safe or secure until we break it. Communications of the ACM, 56(1), 68-72. doi: 10.1145/2398356.2398373 Chapters 3 in Principles of Information Systems Whitmore, J. J. (2001). A method for designing secure solutions. IBM Systems Journal, 40(3), 747-768. Chapters 4 & 5 in Principles of Information Systems Kessler, G.C. (2013, March 4). An overview of cryptography. Retrieved from http://www.garykessler.net/library/crypto.html Chapters 6 & 7 in Principles of Information Systems Brechbuhl, H., Bruce, R., Dynes, S., & Johnson, M. E. (2010). Protecting critical information infrastructure: Developing cybersecurity policy. Information Technology for Development, 16(1), 83-91. doi: 10.1002/itdj.20096 Chapters 8 & 9 in Principles of Information Systems Charitoudi, K., & Blyth, A. (2013). A socio-technical approach to cyber risk management and impact assessment. Journal of information security, 4(1), 33-41. doi: 10.4236/jis.2013.41005 Chapters 11 & 13 in Principles of Information Systems Gillon, K., Branz, L., Culnan, M., Dhillon, G., Hodgkinson, R., & MacWillson, A. (2011). Information security and privacy-rethinking rethinking governance models. Communications of AIS, 28(1), 561-570. Assignments Critical Thinking (50 points) Critical Thinking (100 points) Portfolio topic (0 points) Critical Thinking (50 points) Critical Thinking (100 points) Portfolio Outline (0 points) Critical Thinking (100 points) 7 Chapter 12 in Principles of Information Systems

8 Rotvold, G. (2008). How to create a security culture in your organization. Information management journal, 42(6), 32-38. Chapter 14 in Principles of Information Systems Dittrich, D, Bailey, M., & Dietrich, S. (2011, July/August) Building an active computer security ethics community. IEEE Security & Privacy, 9(4), 32-40. Retrieved from http://web.eecs.umich.edu/~mibailey/publications/ie.umich.edu/~mibailey/publications/ie ee-snp-ethics-2011.pdf Critical Thinking (50 points) Portfolio (350 points) Assignment Details This course includes the following assignments/projects: Module 1 Portfolio Project Read the Portfolio Project Description on the Week 8 Assignments page. The Portfolio Project requires that you evaluate a major cybersecurity breach that has occurred in the recent past. Prior to Week 8, you will submit your topic choice in the assignment drop box in Week 3. In Week 5, you will submit an outline of your project in the drop box. The Portfolio Project will be due at the end of course. Module 2 Case study (50 Points) View the case study from your textbook on Cisco Systems (linked to your course module). Do some research on recent trade secrets thefts. Examples can be found here: http://www.reuters.com/article/2013/02/21/us-usa-trade-secrets-idusbre91j0t220130221idusbre91j0t220130221 http://caselaw.findlaw.com/us-4th-circuit/1558872.html http://www.prnewswire.com/news-releases/dupont-wins-trade-secret-case-against-kolon-industries- 129825528.html In an essay, answer the following questions based on your reading: 1. What are the implications for Cisco and other companies if their trade secrets are compromised? 2. How and why was it possible for hackers to breach the Cisco networks? What vulnerabilities exist at other companies? Provide information from your readings to support your statements. Your essay should be 2-3 pages in length and be well- written, should incorporate at least 2 academic sources from the CSU-Global Library in addition to the case study, and be in

Module 3 Case Study (100 points) Click on the case study from your textbook entitled Case of a Computer Hack (linked to your course module). In an essay, answer the following questions based on this study: 1. Do you think that the long-term counter attack actions that the organization had taken were adequate? 2. In your opinion, do you think that the immediate counter attack actions helped the organization in any way? should incorporate at least 2 academic sources from the CSU-Global Library in addition to the case study, and in Portfolio Submit Topic (0 points) Review the instructions for the Portfolio Project in Module 8. Submit your portfolio topic in the assignment drop box. Include a paragraph describing why you chose that topic and what you problems you anticipate in researching your subject. No points are assigned for this deliverable, but points will be deducted from your final grade on the Portfolio Project if you fail to submit this item as required (see the Portfolio Project Rubric for grading details). Additionally, you will be expected to account for the instructor's feedback in the final version of the Portfolio Project assignment Module 4 Case Study (50 points) View the case study on UC Berkley, in your textbook and linked to your module. In an essay, answer the following questions based on this study: 1. Name the policies and procedures that would enable universities to limit vulnerability while still allowing students access to systems. 2. Ultimately, who should be held responsible for maintaining security policy and how often should it be updated? should incorporate at least 2 academic sources from the CSU-Global Library in addition to the case study, and be in Module 5 Case Study (100 points) View the case study from your textbook entitled Security Management at the Tower (linked to your course module). In an essay, answer the following questions based on this study:

1. Identify key cybersecurity competencies that the organization lacked. What role could the top management have played in ensuring that the organizational security competencies were adequately harnessed? 2. The problems at The Tower were a consequence of inadequate structures of responsibility. Discuss. should incorporate at least 2 academic sources from the CSU-Global Library in addition to the case study, and be in Portfolio Portfolio Outline (0 points) Submit an outline of your portfolio. Review the requirements of the portfolio in Module 8. The outline should reflect the security issue topic you chose in Module 3, and a list of all the required academic sources you will use as part of your portfolio. You will also provide an outline of your critical evaluation. Submit your outline in the assignment dropbox. Include with your outline a draft of your proposed sources, listed in correct APA format using CSU-Global APA formatting. No points are assigned for this deliverable, but points will be deducted from your final grade on the Portfolio Project if you fail to submit this item as required (see the Portfolio Project Rubric for grading details). Additionally, you will be expected to account for the instructor's feedback in the final version of the Portfolio Project assignment Module 6 Case Study (100 points) View the case study from your textbook entitled Computer Crime and the Demise of Barings Bank (linked to your course module). Review also the recent fiasco at Societe Generale where Jerome Kerviel did something very similar to Nick Leeson. Some places to look: http://www.cio.com/article/188201/lessons_from_societe_generale_s_financial_fiasco http://www.guardian.co.uk/business/2011/sep/15/who-are-worst-rogue-traders http://www.telegraph.co.uk/finance/comment/tracycorrigan/8045491/jerome-kerviel-case-why-is-it-so-rare-tosee-a-banker-behind-bars.html In an essay, answer the following questions based on these two events: 1. What governance practices could have prevented the demise of Barings Bank? Could the same practices have helped in the Societe Generale scandal? 2. What kind of technical, formal and informal controls would have helped Barings Bank develop a secure organization? Were those controls in place at Societe Generale? should incorporate at least 2 academic sources from the CSU-Global Library in addition to the case study, and be in Module 7

Self-reflection (50 points) Review all the critical thinking assignments you have completed in this course. Prepare a critical review of what you learned about cyber security management in organizations. Present your self-reflection in 3 to 5 pages, double- spacing. View the CSU-Global Guide for Writing and APA Requirements to help you format your portfolio paper. You may also want to use the APA Template provided in the Library under the APA Guide & Resources link. Provide information from your readings and previous assignments to support your review. Cite your sources using CSU-Global APA formatting. PORTFOLIO: You should be in the final stages of polishing your presentation and report. Make sure you have reviewed the instructions from Week 8 and the Portfolio Project Rubric under Information. It is especially important that you reviewed, and acted upon, the feedback from your instructor on your topic and outline, as part of your grade is based on the improvements you have made. Module 8 PORTFOLIO (350 points) Identify a major cybersecurity breach that has occurred in the recent past (within the last 5 years). In an 8-10 page critical evaluation of your chosen breach, review and analyze the breach along the following dimensions: 1. What went wrong? 2. Why it occurred? 3. Who was responsible? 4. How could it have been prevented? 5. What advice would you offer to prevent such a breach from occurring in the future? Using MS Word, prepare a portfolio of 10-1515 academic articles or other sources of information about the breach. Your portfolio might include scans or links to articles or media reports. Each item must have a caption crediting it, in complete CSU-Global APA format. Use your portfolio as evidence in support of your analysis of the chosen incident. Submit your portfolio as a single document. Multiple documents cannot be submitted for grading. The portfolio should reflect c CSU-Global guidelines using CSU-Global APA formatting and include a page of references in addition to the captions on each article. You may want to view the Does your paper look like this? sample paper found in the Library under the APA Guide & Resources link. Preliminary Deliverables You will submit your topic in Week 3 and your project outline in Week 5. Both assignments should be posted to the dropbox. No points are assigned for these deliverables, but points will be deducted from your final grade on the Portfolio Project if you fail to submit these items as required (see the Portfolio Project Rubric for grading details). Additionally, you will be expected to account for the instructor's feedback in the final version of the Portfolio Project assignment Course Policies Course Grading 20% Discussion Participation Grading Scale and Policies A 95.0 100

45% Critical Thinking Activities 35% Final Portfolio Paper A- 90.0 94.9 B+ 86.7 89.9 B 83.3 86.6 B- 80.0 83.2 C+ 75.0 79.9 C 70.0 74.9 D 60.0 69.9 F 59.9 or below In-Classroom Policies For information on late work and Incomplete grade policies, please refer to our In-Classroom Student Policies and Guidelines or the Academic Catalog for comprehensive documentation of CSU-Global institutional policies. Academic Integrity Students must assume responsibility for maintaining honesty in all work submitted for credit and in any other work designated by the instructor of the course. Academic dishonesty includes cheating, fabrication, facilitating academic dishonesty, plagiarism, reusing /re-purposing your own work (see CSU-Global Guide to Writing and APA Requirements for percentage of repurposed work that can be used in an assignment), unauthorized possession of academic materials, and unauthorized collaboration. The CSU-Global Library provides information on how students can avoid plagiarism by understanding what it is and how to use the Library and Internet resources. Citing Sources with APA Style All students are expected to follow the CSU-Global Guide to Writing and APA Requirements when citing in APA (based on the APA Style Manual, 6th edition) for all assignments. For details on CSU-Global APA style, please review the APA resources within the CSU-Global Library under the APA Guide & Resources link. A link to this document should also be provided within most assignment descriptions on your course s Assignments page. Netiquette Respect the diversity of opinions among the instructor and classmates and engage with them in a courteous, respectful, and professional manner. All posts and classroom communication must be conducted in accordance with the student code of conduct. Think before you push the Send button. Did you say just what you meant? How will the person on the other end read the words? Maintain an environment free of harassment, stalking, threats, abuse, insults or humiliation toward the instructor and classmates. This includes, but is not limited to, demeaning written or oral comments of an ethnic, religious, age, disability, sexist (or sexual orientation), or racist nature; and the unwanted sexual advances or intimidations by email, or on discussion boards and other postings within or connected to the online classroom. If you have concerns about something that has been said, please let your instructor know.