City University of Hong Kong. Course Syllabus. offered by Department of Information Systems with effect from Semester A 2017 / 2018

Similar documents
City University of Hong Kong. Course Syllabus. offered by Department of Computer Science with effect from Semester B 2016/17

City University of Hong Kong. Course Syllabus. offered by Department of Computer Science with effect from Semester A 2017/18

City University of Hong Kong Course Syllabus. offered by Department of Computer Science with effect from Semester A 2017/18

City University of Hong Kong Course Syllabus. offered by Department of Computer Science with effect from Semester A 2017/18

City University of Hong Kong Course Syllabus. offered by College/School/Department of Electronic Engineering with effect from Semester B in 2017/2018

City University of Hong Kong Course Syllabus. offered by Department of Computer Science with effect from Semester B 2017/18

City University of Hong Kong Course Syllabus. offered by College/School/Department of Electronic Engineering with effect from Semester B in 2017/2018

City University of Hong Kong

Course Intended Learning Outcomes (CILOs): Upon successful completion of this course, students should be able to:

MORGAN STATE UNIVERSITY DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING COURSE SYLLABUS FALL, 2015

Standard Course Outline IS 656 Information Systems Security and Assurance

Auditing and assurance

COURSE OUTLINE. Last Amendment Edition Procedure No. Lecturer /blog Room No. Phone No. / Name.

SYLLABUS FORM WESTCHESTER COMMUNITY COLLEGE Valhalla, NY lo595. l. Course #: CIS NAME OF ORIGINATOR or REVISOR: John Watkins

Syllabus for CIT 442 Information System Security 3 Credit Hours Spring 2015

SYLLABUS POSTGRADUATE TRAINING FOR NORDIC COMPUTER FORENSIC INVESTIGATORS. Module 3E Windows Forensics 10 ECTS

ASSIUT UNIVERSITY. Faculty of Computers and Information Department of Information Technology. on Technology. IT PH.D. Program.

UNDERGRADUATE PROGRAMME SPECIFICATION

EE3315 Internet Technology EE3315 Internet Technology Overview Slide 1

BS375 AUDITING. This sample unit outline is provided by CHC for prospective and current students to assist with unit selection.

BSc (Honours) Computer Science Curriculum Outline

Course Information

COURSE OUTLINE. Course code: SCSR 4473 Academic Session/Semester: /2. Course name: Security Management Pre/co requisite (course name

MBA (Part Time) Batch Program Structure

Programming 2. Outline (112) Lecture 0. Important Information. Lecture Protocol. Subject Overview. General Overview.

MODULE SPECIFICATION UNDERGRADUATE PROGRAMMES KEY FACTS

Audit and Assurance Overview

Academic Course Description

Programme Specification

COLLEGE OF COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (CSIT) COURSE OUTLINE SEMESTER /2018

Bachelor of Information Technology (Network Security)

Course Syllabus Internal Control And Auditing ACNT 2331

PROGRAMME SPECIFICATION

Oklahoma State University Spears School of Business Department of Management Information Systems

Version studieåret 2015/2016

PROGRAMME SUMMARY You are required to take eight core modules in terms one and two as outlined in the module list.

Software Reliability and Reusability CS614

CURRICULUM MASTER OF DISASTER MANAGEMENT

Programming 1. Outline (111) Lecture 0. Important Information. Lecture Protocol. Subject Overview. General Overview.

Academic Course Description

PI - Internet Protocols

Philadelphia University Faculty of Information Technology Department of Computer Science --- Semester, 2007/2008. Course Syllabus

ISM 324: Information Systems Security Spring 2014

ITIL - Lifecycle Service Transition Course

Only the original curriculum in Danish language has legal validity in matters of discrepancy

B. Subject-specific skills B1. Problem solving skills: Supply the student with the ability to solve different problems related to the topics

PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES. Programme name Professional Engineering (Civil Engineering)

SRM UNIVERSITY FACULTY OF ENGINEERING AND TECHNOLOGY SCHOOL OF COMPUTING DEPARTMENT OF CSE COURSE PLAN

Module Documentation

Initial CITP and CSci (partial fulfilment). *Confirmation of full accreditation will be sought in 2020.

BS523 (with PDP) Postgraduate Diploma in Management. January 2016 January September 2017

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers

All LJMU programmes are delivered and assessed in English

Bachelor of Design (Interior Design)

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers

In brief, these criteria or elements of a profession are as follows:

Full-Time: 4 Years, Sandwich Thick: 5 Years All LJMU programmes are delivered and assessed in English

MSc Management with Project Management. BS524 (with PDP) Postgraduate Diploma in Management. January 2016 January 2021.

KEY PROGRAMME INFORMATION. Originating institution(s) Bournemouth University. Faculty responsible for the programme Faculty of Science and Technology

University of Mumbai

SRM UNIVERSITY FACULTY OF ENGINEERING AND TECHNOLOGY SCHOOL OF COMPUTING DEPARTMENT OF CSE COURSE PLAN

ITIL Service Transition Lifecycle

Computer Networks IT321

CURRICULUM The Architectural Technology and Construction. programme

TIPA Lead Assessor for ITIL

AD - Distributed Applications

ISO LEAD AUDITOR TRAINING

ASSIUT UNIVERSITY. Faculty of Computers and Information Department of Information Systems. IS Ph.D. Program. Page 0

College of San Mateo Course Outline

Justification: IT/COMP 421 is now IT421. Adjustments made so both CS and IT majors have equivalent prereqs. Corrects error in course justification.

Syllabus Course: MIS Foundation of Information Systems Fall Semester, Credit Hours

Course: 601 : Computer Graphics

PROGRAMME SPECIFICATION

Undergraduate Course Syllabus

Please note: Only the original curriculum in Danish language has legal validity in matters of discrepancy. CURRICULUM

CISA EXAM PREPARATION - Weekend Program

Lahore University of Management Sciences. ACCT 250 Auditing Spring Semester 2018

ITT Technical Institute. NT2740 Advanced Networking Devices Onsite and Online Course SYLLABUS

Syllabus for HIMT 450 Healthcare Information and Technology Standards

ITE 205 Software Design and Programming I

Course Design Document. IS436: Data Security and Privacy. Version 1.0

CPSC 4600 Biometrics and Cryptography Fall 2013, Section 0

Computing Accreditation Commission Version 2.0 CRITERIA FOR ACCREDITING COMPUTING PROGRAMS

ROJECT ANAGEMENT PROGRAM AND COURSE GUIDE

Part A: Course Outline

ITSY 2330 Intrusion Detection Course Syllabus

Course Syllabus MIS Foundation of Information Systems Spring Semester, Credit Hours

MODULE SPECIFICATIONS

BTEC LEVEL 4 Higher National Certificate in Business

ITT Technical Institute. IT360 Networking Security I Onsite Course SYLLABUS

CSC 407 Database System I COURSE PARTICULARS COURSE INSTRUCTORS COURSE DESCRIPTION

IS305 Managing Risk in Information Systems [Onsite and Online]

Course Syllabus MIS Foundation of Information Systems Spring Semester, Credit Hours. (Last updated: 1/16/2016)

ITT Technical Institute. IT217P Programming in C++ II Onsite Course SYLLABUS

Training Catalog. Decker Consulting GmbH Birkenstrasse 49 CH 6343 Rotkreuz. Revision public. Authorized Training Partner

Management Information Systems (MIS)

CALEDONIAN COLLEGE OF ENGINEERING, MODULE HANDBOOK. Department of Electrical & Computer Engineering SULTANATE OF OMAN. Module Code

Course Syllabus MIS Foundation of Information Systems Spring Semester, Credit Hours

SI - Computer Security

Opportunities to Integrate Technology Into the Classroom. Presented by:

Transcription:

City University of Hong Kong offered by Department of Information Systems with effect from Semester A 2017 / 2018 Part I Course Overview Course Title: Information Systems Infrastructure and Security Management Course Code: IS6523 Course Duration: One Semester (13 weeks) Credit Units: 3 Level: Medium of Instruction: Medium of Assessment: Prerequisites: Precursors: Equivalent Courses: Exclusive Courses: P6 English English Nil Nil IS6522 Infrastructure and Security Management for ecommerce Nil Jun 2017 1

Part II Course Details 1. Abstract The aim of this course is to examine key infrastructural and security issues involved in Electronic Commerce transactions. A managerial perspective will be adopted throughout. Both electronic payment infrastructure and transactional security infrastructure will be covered. 2. Course Intended Learning Outcomes (CILOs) (CILOs state what the student is expected to be able to do at the end of the course according to a given standard of performance.) No. CILOs Weighting (if applicable) 1. Apply key security and the IT risks management possible threats facing the business 2. Evaluate different types of audit principles, controls techniques in the context of 3. Apply good security key legal issues involved in design of security policies and 4. Evaluate security of electronic payment infra-structures for 5. Communicate effectively with the stakeholders to provide appropriate security solutions / consultancy to the business 20% Discovery-enriched curriculum related learning outcomes (please tick where appropriate) A1 A2 A3 20% 30% 20% 10% 100% A1: Attitude Develop an attitude of discovery/innovation/creativity, as demonstrated by students possessing a strong sense of curiosity, asking questions actively, challenging assumptions or engaging in inquiry together with teachers. A2: Ability Develop the ability/skill needed to discover/innovate/create, as demonstrated by students possessing critical thinking skills to assess ideas, acquiring research skills, synthesizing knowledge across disciplines or applying academic knowledge to self-life problems. A3: Accomplishments Demonstrate accomplishment of discovery/innovation/creativity through producing /constructing creative works/new artefacts, effective solutions to real-life problems or new processes. Jun 2017 2

3. Teaching and Learning Activities (TLAs) (TLAs designed to facilitate students achievement of the CILOs.) TLA Brief Description CILO No. Hours/week 1 2 3 4 5 (if applicable) TLA1: The following items form the content of the lecture: Lecture Threats understanding and security attacking methods Key concepts of IS security principles and tools Information technology risks management IS audit life cycle and IS audit controls framework Electronic payment infrastructure Security management and policy Legal and ethical issues TLA2: Class Activity In the seminars, the following activities are used to reinforce the concepts learnt in lectures: Exercises: In form of short questions, cases or article readings of the related subjects for students to have the application of concepts and theories learned in the class to the real world. Group Discussion: group discussions aiming to cultivate critical thinking and application of the concepts to the actual business scenarios. 4. Assessment Tasks/Activities (ATs) (ATs are designed to assess how well the students achieve the CILOs.) Assessment Tasks/Activities CILO No. Weighting Remarks 1 2 3 4 5 Continuous Assessment: 50% AT1: Class Activity 5% It consists of class exercises and discussion. Each class activity consists of exercises and group discussions to assess students understanding of the topics and their abilities to apply their knowledge and skills. AT2: Individual Assignment Each student is required on the new developments related to an existing topic to give critical analysis and solution 15% or impact to the business A written report will be used to assess student s competence level in the understanding of new developments based on the foundations of relevant topic. AT3: Project Each student will participate in group project (about 4 to 6 students per group) and work on a IS security / audit 30% analysis report. Each group will be required to submit a project paper of detailed findings and recommendations and make a 20-minute presentation. A well-written report is required to let students demonstrate their ability in applying all the concepts and theories learned in the course to provide a workable solution and consultancy to the business Examination: 50% (duration: one 2-hour exam) AT4: Final Examination A written examination is developed to assess student s competence level of the taught subjects. 50% 100% Note: Students must pass BOTH coursework and examination in order to get an overall pass in this course. Jun 2017 3

5. Assessment Rubrics (Grading of student achievements is based on student performance in assessment tasks/activities with the following rubrics.) Assessment Task AT1: Class Activity AT2: Individual Assignment Criterion business Capability to evaluate different types of audit principles, controls Capability to evaluate security of electronic payment infrastructures for Electronic Commerce. Ability to communicate effectively with the stakeholders to provide appropriate security solutions / consultancy to the business business Capability to evaluate different types of audit principles, controls Capability to evaluate security of electronic payment infrastructures for Electronic Commerce. Excellent (A+, A, A-) Good (B+, B, B-) Fair (C+, C, C-) Marginal (D) Failure (F) Jun 2017 4

AT3: Project AT4: Final Examination business Capability to collaboratively evaluate different types of audit principles, controls Capability to collaboratively evaluate security of electronic payment infra-structures for Ability to communicate effectively with the stakeholders to provide appropriate security solutions / consultancy to the business business Capability to evaluate different types of audit principles, controls Capability to evaluate security of electronic payment infrastructures for Electronic Commerce. Jun 2017 5

Part III Other Information (more details can be provided separately in the teaching plan) 1. Keyword Syllabus (An indication of the key topics of the course.) IS Auditing; IS Security Management Practices; Information Technology Risks Management; Controls Framework; Electronic Payment Systems and Infrastructure; Security Policy; Threats; Attacking Methods; Security Principles and Tools; Network Security. Details: Privacy and Security Principles: Data and transactional security, data privacy, overview of privacy and security technologies public key encryption, digital signature. Network security: types of security breach, general attack methods, intrusion detection system, firewall, identity threat management. Electronic Payment Systems: technology overview, digital cash, electronic cheques, on-line credit cards, stored value cards, on-line electronic fund transfer and debit cards, payment settlement systems and protocols. Certification Authorities: technology and organizational overview, formation, role, code of practice for recognised certification authorities in HKSAR. System Control and Audit: overview of information systems audit principles, management control, application control, evidence. System Security Management: roles and functions, risk assessment, security strategies and policies, implementation issues, critical success factors. Legal and Professional issues: professional code of conduct, overview of laws relating to computer crimes, on-line transactions, intellectual property and data privacy. 2. Reading List 2.1 Compulsory Readings (Compulsory readings can include books, book chapters, or journal/magazine articles. There are also collections of e- books, e-journals available from the CityU Library.) 1. Michael E. Whitman, Herbert J. Mattord, Principles of Information Security, Course Technology, 5 th edition (November 18, 2014). ISBN: 978-1285448367 2.2 Additional Readings (Additional references for students to learn to expand their knowledge about the subject.) 1. Greenstein Marilyn, Vasarhelyi Miklos, Electronic Commerce: Security, Risk Management and Control, 2nd edition, 2002, McGraw Hill. ISBN: 0072410817 2. Michael E. Whitman, Herbert J. Mattord, Management of Information Security, Thomson Course Technology, 2008. ISBN: 1423901304 3. Conklin, et. al, Principles of Computer Security, 2005, McGraw Hill. ISBN: 0071245006 4. Hunton, J., Bryan, S. and Bagranoff, N., Core Concepts of Information Technology Auditing, 2004, Wiley & Sons 5. Weber, Ron, Information Systems Control and Audit, 1999, Prentice-Hall, Inc. ISBN: 0139478701 6. Krause Micki, Tipton Harold, Handbook of Information Security Management, Auerbach, 1999. ISBN: 0849399742 7. Champlain Jack, Auditing Information Systems: A Comprehensive Reference Guide, 1998, John Wiley. ISBN: 0471168904 Jun 2017 6

2.3 Other Resources Selected readings from: Computers and Security; ISACA Journal Updated SYL template in July 2017. Jun 2017 7