Required Text
Kim, David. (2018). Fundamentals of Information Systems Security (3rd ed.). Jones & Bartlett.
ISBN: 9781284128567
This course also requires access to HatSize. Check your email account for access provided by the Grantham Bookstore.
Course Description
This course provides a broad overview of the principles, policies and technologies for securing computer and information systems. Topics include a survey of computer systems vulnerabilities, cryptographic techniques, access control policies and mechanisms, and the implications of security technology in the realm of risk management. Designing and implementing computer security policies and standards, formulation contingency plans, and analyzing systems security architectures as well as compliance and ethics are examined. In addition to this technical content, the course teaches the importance of management, administration and the place information security holds in overall business risk, social issues, individual privacy and the role of public policy.
Course Objectives
· Evaluate the need for information security and how it changes our lives
· Identify how to prevent malicious attacks, threats, and vulnerabilities
· Explain information security and business (BIA, BCP, DRP) and how it applies to organizations
· Explain access controls
· Consider security operations and administration in an organization
· Identify auditing, testing, monitoring, and risk response techniques
· Describe the standards and components of voice and data network
· Apply cryptography to business
Credit Hours: 3
Prerequisites: None
Tentative Course
Schedule
Course Week |
Weekly Content |
Week 1: “Introduction to Information Systems” |
· Read Chapters 1 and 2 · Video lecture · Discussion: “Introductions” · Lab 1: “Performance Reconnaissance and Probing Using Common Tools” · Quiz |
Week 2: “Assessing Risk, Threats, and Risk Management |
· Read Chapters 3 and 4 · Video lecture · Discussion: “Describe Threats and Vulnerabilities and How to Address Them Using a BIA, BCP, or DRP” · Lab 2: “Performing a Vulnerability Assessment” · Lab 6: “Implementing a Business Continuity Plan” · Quiz |
Week 3: “Access Controls and Security Operations” |
· Read Chapters 5 and 6 · Video lecture · Discussion: “Describe Physical and Logical Access Controls – What and Where to Use Them” · Lab 3: “Eliminating Windows Active Directory and User Access Controls” · Lab 9: “Eliminating Threats with a Layered Security Approach” · Quiz |
Week 4: “Testing, Monitoring, Risk, Response, and Recovery” |
· Read Chapters 7 and 8 · Video lecture · Discussion: “Breakdown the Risk Management Process” · Lab 4: “Using Group Policy Objects and Microsoft Baseline Security Analyzer for Change Control” · Quiz |
Week 5: “Cryptography” |
· Read Chapter 9 · Video lecture · Discussion: “Describe Asymmetric, Symmetric, and Public versus Private Keys” · Lab 5: “Performing Packet Capture and Traffic Analysis” · Lab 7: “Using Encryption to Enhance Confidentiality and Integrity” · Midterm |
Week 6: “TCP/IP and Malicious Code and Activity” |
· Read Chapters 10 and 11 · Video lecture · Discussion: “Describe the OSI Model and Breakdown Each Layer and How It Performs” · Lab 8: “Performing a Web Site and Database Attack by Exploiting Identified Vulnerabilities” · Quiz |
Week 7: “Information Standards and Compliance Laws” |
· Read Chapters 12 and 15 · Video lecture · Discussion: “U.S. Compliance Laws” · Lab 10: “Implementing an Information Systems Security Policy” · Quiz |
Week 8: “Professional Certifications” |
· Read Chapters 13 and 14 · Video lecture · Discussion: “Review and Reflection” · Assignment: “What Certification Would You Prefer and Why?” · Final Exam |
Grading Policy
Grading Category |
Grade Weight |
Labs & Assignments |
40% |
Discussions |
20% |
Quizzes |
20% |
Midterm |
10% |
Final |
10% |
Estimated Student
Workload
The following table outlines the academic effort required by students to become successful in this course. While the times in the table are hourly approximations, it is presented to help students with their time management. Please note, depending on the student’s background knowledge and experience of the course subject, and an individual student’s academic capabilities, these times will vary.
Course Week |
Activity and Time Required |
Week 1 |
· Reading/Watching: 3.1 · Discussion: 3.0 · Homework: 2.0 · Hands On: 8.0 · Total Time Estimated: 16.1 |
Week 2 |
· Reading/Watching: 2.7 · Discussion: 3.0 · Homework: 2.0 · Hands On: 12.0 · Total Time Estimated: 19.7 |
Week 3 |
· Reading/Watching: 3.4 · Discussion: 3.0 · Homework: 2.0 · Hands On: 12.0 · Total Time Estimated: 20.4 |
Week 4 |
· Reading/Watching: 3.1 · Discussion: 3.0 · Homework: 5.0 · Hands On: 8.0 · Total Time Estimated: 19.1 |
Week 5 |
· Reading/Watching: 1.8 · Discussion: 3.0 · Homework: 2.0 · Hands On: 12.0 · Total Time Estimated: 18.8 |
Week 6 |
· Reading/Watching: 3.0 · Discussion: 3.0 · Homework: 2.0 · Hands On: 8.0 · Total Time Estimated: 16.0 |
Week 7 |
· Reading/Watching: 2.5 · Discussion: 3.0 · Homework: 2.0 · Hands On: 8.0 · Total Time Estimated: 15.5 |
Week 8 |
· Reading/Watching: 2.5 · Discussion: 3.0 · Homework: 11.0 · Total Time Estimated: 16.5 |