ISM530 Enterprise Cybersecurity Credit Hours: 3 Contact Hours: This is a 3-credit course, offered in accelerated format. This means that 16 weeks of material is covered in 8 weeks. The exact number of hours per week that you can expect to spend on each course will vary based upon the weekly coursework, as well as your study style and preferences. You should plan to spend 10-25 hours per week in each course reading material, interacting on the discussion boards, writing papers, completing projects, and doing research. Course Description and Outcomes This course provides students with insight into the cybersecurity issues surrounding an enterprise. These include securing organizational data, responding to cyber- based security breaches, emerging technologies, and ensuring a secured computing environment for safeguarding company information. The course reviews the network security and cryptographic techniques that are currently being used. The nuances involved in defining cybersecurity strategies and complying with security standards to ensure governance are also discussed. Course Learning Outcomes: 1. Analyze possible threats to organizational data and recommend course(s) of action to mitigate cybercrime attacks. 2. Evaluate different authentication methodologies to provide solutions to secure information assets. 3. Explain how authentication is used with cryptography to secure information access. 4. Demonstrate the ability to recognize e and communicate threats to organizational information assets. 5. Analyze and evaluate the commitment of foreign governments for the expansion of nationally owned telecommunications services for the support of business and government technologies. Participation & Attendance Prompt and consistent attendance in your online courses is essential for your success at CSU-Global Campus. Failure to verify your attendance within the first 7 days of this course may result in your withdrawal. If for some reason you would like to drop a course, please contact your advisor. Online classes have deadlines, assignments, and participation requirements just like on-campus classes. Budget your time carefully and keep an open line of communication with your instructor. If you are having technical problems, problems with your assignments, or other problems that are impeding your progress, let your instructor know as soon as possible. Course Materials
Textbook Information is located in the CSU-Global Booklist on the Student Portal. Course Schedule Due Dates The Academic Week at CSU-Global begins on Monday and ends the following Sunday. Discussion Boards: The original post must be completed by Thursday at 12 midnight MT and Peer Responses posted by Sunday 12 midnight MT. Late posts may not be awarded points. Mastery Exercises: Students may access and retake mastery exercises through the last day of class until they achieve the scores they desire. Critical Thinking Activities: Assignments are due Sunday at 12 midnight MT. Week # 1 2 3 4 5 6 Readings Chapters 1 & 2 in Principles of Information Systems Grossman, J. (2013). The web won't be safe or secure until we break it. Communications of the ACM, 56(1), 68-72. doi: 10.1145/2398356.2398373 Chapters 3 in Principles of Information Systems Whitmore, J. J. (2001). A method for designing secure solutions. IBM Systems Journal, 40(3), 747-768. Chapters 4 & 5 in Principles of Information Systems Kessler, G.C. (2013, March 4). An overview of cryptography. Retrieved from http://www.garykessler.net/library/crypto.html Chapters 6 & 7 in Principles of Information Systems Brechbuhl, H., Bruce, R., Dynes, S., & Johnson, M. E. (2010). Protecting critical information infrastructure: Developing cybersecurity policy. Information Technology for Development, 16(1), 83-91. doi: 10.1002/itdj.20096 Chapters 8 & 9 in Principles of Information Systems Charitoudi, K., & Blyth, A. (2013). A socio-technical approach to cyber risk management and impact assessment. Journal of information security, 4(1), 33-41. doi: 10.4236/jis.2013.41005 Chapters 11 & 13 in Principles of Information Systems Gillon, K., Branz, L., Culnan, M., Dhillon, G., Hodgkinson, R., & MacWillson, A. (2011). Information security and privacy-rethinking rethinking governance models. Communications of AIS, 28(1), 561-570. Assignments Critical Thinking (50 points) Critical Thinking (100 points) Portfolio topic (0 points) Critical Thinking (50 points) Critical Thinking (100 points) Portfolio Outline (0 points) Critical Thinking (100 points) 7 Chapter 12 in Principles of Information Systems
8 Rotvold, G. (2008). How to create a security culture in your organization. Information management journal, 42(6), 32-38. Chapter 14 in Principles of Information Systems Dittrich, D, Bailey, M., & Dietrich, S. (2011, July/August) Building an active computer security ethics community. IEEE Security & Privacy, 9(4), 32-40. Retrieved from http://web.eecs.umich.edu/~mibailey/publications/ie.umich.edu/~mibailey/publications/ie ee-snp-ethics-2011.pdf Critical Thinking (50 points) Portfolio (350 points) Assignment Details This course includes the following assignments/projects: Module 1 Portfolio Project Read the Portfolio Project Description on the Week 8 Assignments page. The Portfolio Project requires that you evaluate a major cybersecurity breach that has occurred in the recent past. Prior to Week 8, you will submit your topic choice in the assignment drop box in Week 3. In Week 5, you will submit an outline of your project in the drop box. The Portfolio Project will be due at the end of course. Module 2 Case study (50 Points) View the case study from your textbook on Cisco Systems (linked to your course module). Do some research on recent trade secrets thefts. Examples can be found here: http://www.reuters.com/article/2013/02/21/us-usa-trade-secrets-idusbre91j0t220130221idusbre91j0t220130221 http://caselaw.findlaw.com/us-4th-circuit/1558872.html http://www.prnewswire.com/news-releases/dupont-wins-trade-secret-case-against-kolon-industries- 129825528.html In an essay, answer the following questions based on your reading: 1. What are the implications for Cisco and other companies if their trade secrets are compromised? 2. How and why was it possible for hackers to breach the Cisco networks? What vulnerabilities exist at other companies? Provide information from your readings to support your statements. Your essay should be 2-3 pages in length and be well- written, should incorporate at least 2 academic sources from the CSU-Global Library in addition to the case study, and be in
Module 3 Case Study (100 points) Click on the case study from your textbook entitled Case of a Computer Hack (linked to your course module). In an essay, answer the following questions based on this study: 1. Do you think that the long-term counter attack actions that the organization had taken were adequate? 2. In your opinion, do you think that the immediate counter attack actions helped the organization in any way? should incorporate at least 2 academic sources from the CSU-Global Library in addition to the case study, and in Portfolio Submit Topic (0 points) Review the instructions for the Portfolio Project in Module 8. Submit your portfolio topic in the assignment drop box. Include a paragraph describing why you chose that topic and what you problems you anticipate in researching your subject. No points are assigned for this deliverable, but points will be deducted from your final grade on the Portfolio Project if you fail to submit this item as required (see the Portfolio Project Rubric for grading details). Additionally, you will be expected to account for the instructor's feedback in the final version of the Portfolio Project assignment Module 4 Case Study (50 points) View the case study on UC Berkley, in your textbook and linked to your module. In an essay, answer the following questions based on this study: 1. Name the policies and procedures that would enable universities to limit vulnerability while still allowing students access to systems. 2. Ultimately, who should be held responsible for maintaining security policy and how often should it be updated? should incorporate at least 2 academic sources from the CSU-Global Library in addition to the case study, and be in Module 5 Case Study (100 points) View the case study from your textbook entitled Security Management at the Tower (linked to your course module). In an essay, answer the following questions based on this study:
1. Identify key cybersecurity competencies that the organization lacked. What role could the top management have played in ensuring that the organizational security competencies were adequately harnessed? 2. The problems at The Tower were a consequence of inadequate structures of responsibility. Discuss. should incorporate at least 2 academic sources from the CSU-Global Library in addition to the case study, and be in Portfolio Portfolio Outline (0 points) Submit an outline of your portfolio. Review the requirements of the portfolio in Module 8. The outline should reflect the security issue topic you chose in Module 3, and a list of all the required academic sources you will use as part of your portfolio. You will also provide an outline of your critical evaluation. Submit your outline in the assignment dropbox. Include with your outline a draft of your proposed sources, listed in correct APA format using CSU-Global APA formatting. No points are assigned for this deliverable, but points will be deducted from your final grade on the Portfolio Project if you fail to submit this item as required (see the Portfolio Project Rubric for grading details). Additionally, you will be expected to account for the instructor's feedback in the final version of the Portfolio Project assignment Module 6 Case Study (100 points) View the case study from your textbook entitled Computer Crime and the Demise of Barings Bank (linked to your course module). Review also the recent fiasco at Societe Generale where Jerome Kerviel did something very similar to Nick Leeson. Some places to look: http://www.cio.com/article/188201/lessons_from_societe_generale_s_financial_fiasco http://www.guardian.co.uk/business/2011/sep/15/who-are-worst-rogue-traders http://www.telegraph.co.uk/finance/comment/tracycorrigan/8045491/jerome-kerviel-case-why-is-it-so-rare-tosee-a-banker-behind-bars.html In an essay, answer the following questions based on these two events: 1. What governance practices could have prevented the demise of Barings Bank? Could the same practices have helped in the Societe Generale scandal? 2. What kind of technical, formal and informal controls would have helped Barings Bank develop a secure organization? Were those controls in place at Societe Generale? should incorporate at least 2 academic sources from the CSU-Global Library in addition to the case study, and be in Module 7
Self-reflection (50 points) Review all the critical thinking assignments you have completed in this course. Prepare a critical review of what you learned about cyber security management in organizations. Present your self-reflection in 3 to 5 pages, double- spacing. View the CSU-Global Guide for Writing and APA Requirements to help you format your portfolio paper. You may also want to use the APA Template provided in the Library under the APA Guide & Resources link. Provide information from your readings and previous assignments to support your review. Cite your sources using CSU-Global APA formatting. PORTFOLIO: You should be in the final stages of polishing your presentation and report. Make sure you have reviewed the instructions from Week 8 and the Portfolio Project Rubric under Information. It is especially important that you reviewed, and acted upon, the feedback from your instructor on your topic and outline, as part of your grade is based on the improvements you have made. Module 8 PORTFOLIO (350 points) Identify a major cybersecurity breach that has occurred in the recent past (within the last 5 years). In an 8-10 page critical evaluation of your chosen breach, review and analyze the breach along the following dimensions: 1. What went wrong? 2. Why it occurred? 3. Who was responsible? 4. How could it have been prevented? 5. What advice would you offer to prevent such a breach from occurring in the future? Using MS Word, prepare a portfolio of 10-1515 academic articles or other sources of information about the breach. Your portfolio might include scans or links to articles or media reports. Each item must have a caption crediting it, in complete CSU-Global APA format. Use your portfolio as evidence in support of your analysis of the chosen incident. Submit your portfolio as a single document. Multiple documents cannot be submitted for grading. The portfolio should reflect c CSU-Global guidelines using CSU-Global APA formatting and include a page of references in addition to the captions on each article. You may want to view the Does your paper look like this? sample paper found in the Library under the APA Guide & Resources link. Preliminary Deliverables You will submit your topic in Week 3 and your project outline in Week 5. Both assignments should be posted to the dropbox. No points are assigned for these deliverables, but points will be deducted from your final grade on the Portfolio Project if you fail to submit these items as required (see the Portfolio Project Rubric for grading details). Additionally, you will be expected to account for the instructor's feedback in the final version of the Portfolio Project assignment Course Policies Course Grading 20% Discussion Participation Grading Scale and Policies A 95.0 100
45% Critical Thinking Activities 35% Final Portfolio Paper A- 90.0 94.9 B+ 86.7 89.9 B 83.3 86.6 B- 80.0 83.2 C+ 75.0 79.9 C 70.0 74.9 D 60.0 69.9 F 59.9 or below In-Classroom Policies For information on late work and Incomplete grade policies, please refer to our In-Classroom Student Policies and Guidelines or the Academic Catalog for comprehensive documentation of CSU-Global institutional policies. Academic Integrity Students must assume responsibility for maintaining honesty in all work submitted for credit and in any other work designated by the instructor of the course. Academic dishonesty includes cheating, fabrication, facilitating academic dishonesty, plagiarism, reusing /re-purposing your own work (see CSU-Global Guide to Writing and APA Requirements for percentage of repurposed work that can be used in an assignment), unauthorized possession of academic materials, and unauthorized collaboration. The CSU-Global Library provides information on how students can avoid plagiarism by understanding what it is and how to use the Library and Internet resources. Citing Sources with APA Style All students are expected to follow the CSU-Global Guide to Writing and APA Requirements when citing in APA (based on the APA Style Manual, 6th edition) for all assignments. For details on CSU-Global APA style, please review the APA resources within the CSU-Global Library under the APA Guide & Resources link. A link to this document should also be provided within most assignment descriptions on your course s Assignments page. Netiquette Respect the diversity of opinions among the instructor and classmates and engage with them in a courteous, respectful, and professional manner. All posts and classroom communication must be conducted in accordance with the student code of conduct. Think before you push the Send button. Did you say just what you meant? How will the person on the other end read the words? Maintain an environment free of harassment, stalking, threats, abuse, insults or humiliation toward the instructor and classmates. This includes, but is not limited to, demeaning written or oral comments of an ethnic, religious, age, disability, sexist (or sexual orientation), or racist nature; and the unwanted sexual advances or intimidations by email, or on discussion boards and other postings within or connected to the online classroom. If you have concerns about something that has been said, please let your instructor know.