Title: Grantham Logo - Description: Grantham Logo

Introduction to Information Systems Security

Required Text

Kim, David. (2018). Fundamentals of Information Systems Security (3rd ed.). Jones & Bartlett.

ISBN: 9781284128567

This course also requires access to HatSize. Check your email account for access provided by the Grantham Bookstore.

Course Description

This course provides a broad overview of the principles, policies and technologies for securing computer and information systems. Topics include a survey of computer systems vulnerabilities, cryptographic techniques, access control policies and mechanisms, and the implications of security technology in the realm of risk management. Designing and implementing computer security policies and standards, formulation contingency plans, and analyzing systems security architectures as well as compliance and ethics are examined. In addition to this technical content, the course teaches the importance of management, administration and the place information security holds in overall business risk, social issues, individual privacy and the role of public policy.

Course Objectives

·         Evaluate the need for information security and how it changes our lives

·         Identify how to prevent malicious attacks, threats, and vulnerabilities

·         Explain information security and business (BIA, BCP, DRP) and how it applies to organizations

·         Explain access controls

·         Consider security operations and administration in an organization

·         Identify auditing, testing, monitoring, and risk response techniques

·         Describe the standards and components of voice and data network

·         Apply cryptography to business

Credit Hours: 3

Prerequisites: None

Tentative Course Schedule

Course Week

Weekly Content

Week 1: “Introduction to Information Systems”

·         Read Chapters 1 and 2

·         Video lecture

·         Discussion: “Introductions”

·         Lab 1: “Performance Reconnaissance and Probing Using Common Tools”

·         Quiz

Week 2: “Assessing Risk, Threats, and Risk Management

·         Read Chapters 3 and  4

·         Video lecture

·         Discussion: “Describe Threats and Vulnerabilities and How to Address Them Using a BIA, BCP, or DRP” 

·         Lab 2: “Performing a Vulnerability Assessment”

·         Lab 6: “Implementing a Business Continuity Plan”

·         Quiz

Week 3: “Access Controls and Security Operations”

·         Read Chapters 5 and 6

·         Video lecture

·         Discussion: “Describe Physical and Logical Access Controls – What and Where to Use Them”

·         Lab 3: “Eliminating Windows Active Directory and User Access Controls”

·         Lab 9: “Eliminating Threats with a Layered Security Approach”

·         Quiz

Week 4: “Testing, Monitoring, Risk, Response, and Recovery”

·         Read Chapters 7 and 8

·         Video lecture

·         Discussion: “Breakdown the Risk Management Process”

·         Lab 4: “Using Group Policy Objects and Microsoft Baseline Security Analyzer for Change Control”

·         Quiz

Week 5: “Cryptography”

·         Read Chapter 9

·         Video lecture

·         Discussion: “Describe Asymmetric, Symmetric, and Public versus Private Keys”

·         Lab 5: “Performing Packet Capture and Traffic Analysis”

·         Lab 7: “Using Encryption to Enhance Confidentiality and Integrity”

·         Midterm

Week 6: “TCP/IP and Malicious Code and Activity”

·         Read Chapters 10 and 11

·         Video lecture

·         Discussion: “Describe the OSI Model and Breakdown Each Layer and How It Performs”

·         Lab 8: “Performing a Web Site and Database Attack by Exploiting Identified Vulnerabilities”

·         Quiz

Week 7: “Information Standards and Compliance Laws”

·         Read Chapters 12 and 15

·         Video lecture

·         Discussion: “U.S. Compliance Laws”

·         Lab 10: “Implementing an Information Systems Security Policy”

·         Quiz 

Week 8: “Professional Certifications”

·         Read Chapters 13 and 14

·         Video lecture

·         Discussion: “Review and Reflection”

·         Assignment: “What Certification Would You Prefer and Why?”

·         Final Exam

 

Grading Policy

Grading Category

Grade Weight

Labs & Assignments

40%

Discussions

20%

Quizzes

20%

Midterm

10%

Final

10%

 

Estimated Student Workload

The following table outlines the academic effort required by students to become successful in this course. While the times in the table are hourly approximations, it is presented to help students with their time management. Please note, depending on the student’s background knowledge and experience of the course subject, and an individual student’s academic capabilities, these times will vary.

Course Week

Activity and Time Required

Week 1

·         Reading/Watching: 3.1

·         Discussion: 3.0

·         Homework: 2.0

·         Hands On: 8.0

·         Total Time Estimated: 16.1

Week 2

·         Reading/Watching: 2.7

·         Discussion: 3.0

·         Homework: 2.0

·         Hands On: 12.0

·         Total Time Estimated: 19.7

Week 3

·         Reading/Watching: 3.4

·         Discussion: 3.0

·         Homework: 2.0

·         Hands On: 12.0

·         Total Time Estimated: 20.4

Week 4

·         Reading/Watching: 3.1

·         Discussion: 3.0

·         Homework: 5.0

·         Hands On: 8.0

·         Total Time Estimated: 19.1

Week 5

·         Reading/Watching: 1.8

·         Discussion: 3.0

·         Homework: 2.0

·         Hands On: 12.0

·         Total Time Estimated: 18.8

Week 6

·         Reading/Watching: 3.0

·         Discussion: 3.0

·         Homework: 2.0

·         Hands On: 8.0

·         Total Time Estimated: 16.0

Week 7

·         Reading/Watching: 2.5

·         Discussion: 3.0

·         Homework: 2.0

·         Hands On: 8.0

·         Total Time Estimated: 15.5

Week 8

·         Reading/Watching: 2.5

·         Discussion: 3.0

·         Homework: 11.0

·         Total Time Estimated: 16.5



Title: Grantham Copyright - Description: Grantham Copyright 2018