Oklahoma State University Spears School of Business Department of Management Information Systems

Similar documents
INFS 2150 (Section A) Fall 2018

COURSE OUTLINE. Last Amendment Edition Procedure No. Lecturer /blog Room No. Phone No. / Name.

ISM 324: Information Systems Security Spring 2014

Syllabus for CIT 442 Information System Security 3 Credit Hours Spring 2015

ITSY Information Technology Security Course Syllabus Spring 2018

Oklahoma State University Institute of Technology Face-to-Face Common Syllabus Fall 2017

Oklahoma State University Oklahoma City ITD 1113: Windows Expert User Syllabus Fall, 2014

South Portland, Maine Computer Information Security

Advisory: Students should have already taken MICROCOMPUTER APPLICATIONS II - 431

Network Security

Syllabus for HPE 451 Directed Study 1-3 Credit Hours Spring 2014

MORGAN STATE UNIVERSITY DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING COURSE SYLLABUS FALL, 2015

MGMT 4336 Networks & Data Communication Section D10

Syllabus for HPE 120 Dance Aerobic Proficiency 0.0 Credit Hour Spring 2012

Course Title: Computer Networking 2. Course Section: CNS (Winter 2018) FORMAT: Face to Face

Computer Science Technology Department

Standard Course Outline IS 656 Information Systems Security and Assurance

Instructor: Anna Miller

WAYLAND BAPTIST UNIVERSITY VIRTUAL CAMPUS SCHOOL OF BUSINESS SYLLABUS

Oklahoma State University Institute of Technology Face-to-Face Common Syllabus Fall 2017

Syllabus for HPE 099 Aerobic Proficiency 1 Credit Hour Spring 2015

Syllabus for HPE 016 Beginning Badminton and Fitness 1 Credit Hour Spring 2014

Database Design and Management - BADM 352 Fall 2009 Syllabus and Schedule

Project Management Professional (PMP ) Exam Preparation Course

South Portland, Maine Computer Information Technology. Web Site: blackboard.smccme.edu. Course Syllabus

THE UNIVERSITY OF TEXAS AT AUSTIN MIS373 e-discovery and Digital Forensics SPRING 2015 Unique#: (03883) VERSION: 1/23/2015

Department of Computer Science

ISATI 231: Windows Client (4 credits) Spring 2018 Mon, Tue, Wed, Thu, 13:10-14:40, MTB 105

COURSE SYLLABUS AND INSTRUCTOR PLAN

Syllabus for HPE 099 Aerobic Proficiency 1 Credit Hour Fall 2012

Syllabus for HPE 038 Scuba Open Water II and Fitness.5-1 Credit Hour Spring 2014

Syllabus for HPE 021 Advanced Golf and Fitness 1 Credit Hour Fall 2014

CASPER COLLEGE COURSE SYLLABUS MSFT 1600 Managing Microsoft Exchange Server 2003 Semester/Year: Fall 2007

Syllabus Revised 01/03/2018

FORM I: SUMMARY PAGE FOR PROPOSAL # CSCI

Syllabus for HPE 021 Advanced Golf and Fitness 1 Credit Hour Spring 2016

COURSE OUTLINE. Course code: SCSR 4473 Academic Session/Semester: /2. Course name: Security Management Pre/co requisite (course name

RYERSON UNIVERSITY Ted Rogers School of Information Technology Management And G. Raymond Chang School of Continuing Education

Renewal Unit (RU) Provider Handbook and Application

Syllabus for HPE 024 Intermediate Swimming and Fitness 1 Credit Hour Fall 2012

Advanced Relational Database Management MISM Course S A3 Spring 2019 Carnegie Mellon University

Computer Science Department

Syllabus for HPE 092 Exercise and Weight Control 1 Credit Hour Spring 2015

Course Syllabus: CompTIA Project+

Geography 3300: Transportation Security

CSCI 6312 Advanced Internet Programming

Course Title: Network+/Networking Fundamentals. Course Section: CNS-101-I1. FORMAT: Online

Computer Science Technology Department

THE UNIVERSITY OF TEXAS AT AUSTIN MIS373 e-discovery and Digital Forensics SPRING 2015 Unique#: (03665) VERSION: 2_011718

HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD Course Outline Routing and Switching Essentials [CISCO 2] ISS 112

Syllabus for HPE 042 Creative Aerobics and Fitness Credit Hour Spring 2013

Syllabus for HPE 076 Varsity Volleyball (Women) Sports 1 Credit Hour Fall 2014

Syllabus: AIT Information Systems Infrastructure Lifecycle Management

ESET 369 Embedded Systems Software, Spring 2018

Syllabus for CSC 455 Database Systems 3 Credit Hours Spring 2012

ITCC112. Course Summary. Description. Objectives

San José State University Computer Science Department CS49J, Section 3, Programming in Java, Fall 2015

Syllabus for HPE 007 Basic First Aid and CPR and Fitness 1 Credit Hour Spring 2016

Faculty of Science & Information Technology

COURSE NUMBER: ISS 214 COURSE NAME: Connecting Networks - Cisco 4 SEMESTER CREDIT HOURS: 4.

IST359 - INTRODUCTION TO DATABASE MANAGEMENT SYSTEMS

BRAZOSPORT COLLEGE LAKE JACKSON, TEXAS SYLLABUS. ITNW 2313: NETWORKING HARDWARE Online Course Version COMPUTER TECHNOLOGY DEPARTMENT

University of San Francisco Course Syllabus and Outline

Management Information Systems

Oklahoma State University Institute of Technology Online Common Syllabus Spring 2019

San Jose State University College of Science Department of Computer Science CS151, Object-Oriented Design, Sections 1, 2, and 3, Spring 2018

Computer Science Technology Department

ITP489 In-Memory DBMS for Real Time Analytics

X

CPSC 5157G Computer Networks

Syllabus -- CIS Computer Maintenance / A+ Certification

City University of Hong Kong. Course Syllabus. offered by Department of Information Systems with effect from Semester A 2017 / 2018

ITCC111. Course Summary. Description. Objectives. Outline

Syllabus for HPE 045 Pilates for Christians and Fitness 1 Credit Hour Spring 2016

ITSY 1342 Information Technology Security Spring 2017

When does RDBMS representation make sense When do other representations make sense. Prerequisites: CS 450/550 Database Concepts

INST Database Design and Modeling - Section 0101 Spring Tentative Syllabus

CS 241 Data Organization using C

ESET 349 Microcontroller Architecture, Fall 2018

Course Syllabus MIS Foundation of Information Systems Spring Semester, Credit Hours. (Last updated: 1/16/2016)

CS 200, Section 1, Programming I, Fall 2017 College of Arts & Sciences Syllabus

Course Syllabus Internal Control And Auditing ACNT 2331

ITSC 1319 INTERNET/WEB PAGE DEVELOPMENT SYLLABUS

Syllabus for HPE 098 Triathlon Training 1 Credit Hour Fall 2014

BEMIDJI STATE UNIVERSITY COLLEGE OF BUSINESS, TECHNOLOGY AND COMMUNICATION Course syllabus Fall 2012

Division of Engineering, Computer Programming, and Technology

Name of Department: Semester: Instructor Name Office Hours. Telephone Class Meeting Days/Times Location

CS 4230 Java Application Development Syllabus

Syllabus for HPE 026 Beginning Swimming and Fitness 1 Credit Hour Fall 2012

San José State University Department of Computer Science CS166, Information Security, Section 1, Fall, 2018

HOUSTON COMMUNITY COLLEGE SOUTHWEST. Local Area Networks Design and Protocol Cisco 1 ITCC 1002

Audit and Assurance Overview

ESET 369 Embedded Systems Software, Fall 2017

CISN 340 Data Communication and Networking Fundamentals Fall 2012 (Hybrid)

EXAM PREPARATION GUIDE

MWF 9:00-9:50AM & 12:00-12:50PM (ET)

CSCI 201L Syllabus Principles of Software Development Spring 2018

Syllabus Revised 08/21/17

Syllabus for HPE 024 Intermediate Swimming and Fitness 1 Credit Hour Spring 2016

Syllabus for HPE 005 Fitness Club 1 Credit hour Fall 2016

Transcription:

Oklahoma State University Spears School of Business Department of Management Information Systems Information Assurance Management TCOM 5223 Wednesday 4:30 PM 7:10 PM (Central Time) Location: Tulsa North Hall Room 222 FACULTY Instructor: Shalon Simmons Office: 373A Office Hours (Tulsa): By Appointment Telephone: (918) 293-4786 e-mail: shalon.simmons@okstate.edu Class web page: See D2L Graduate Assistant: Anup Mirashi e-mail: anup.mirashi@okstate.edu COURSE DESCRIPTION The history of information technology development over the past half century, and increasingly over the past 15 years, has altered the way that information can be created, transmitted, used, and abused. The days of just locking up the computer room are gone forever, as businesses and individuals struggle to strike a balance between adequate information system controls and system usefulness. This course presents the student with an understanding of the issues of information security from the perspective of MIS. The material covered will include offensive and defensive information operations, information security on the Internet, leadership development for information security professionals and information security as it relates to electronic commerce. LEARNING GOALS AND COURSE OBJECTIVES: Upon completion of this course in each of the categories below the student should be able to: Ethical Decision Making Identify the ethical issues of various forms and degrees of hacking Identify the ethical responsibilities of Information Assurance professionals Identify the different roles of law enforcement, politics, court decisions, corporate influence and consumer attitudes surrounding issues of intellectual property rights Business Knowledge and Competency Demonstrate a basic knowledge of the vocabulary, processes, environment and practices of the IA function in the context of the business environment. Recognize interrelationships between the MIS security function and the other core business disciplines. Recognize and appreciate the global differences and similarities in the application of IA in the differing legal and cultural environments worldwide. Technological Competence Recognize, discuss and evaluate a variety of core MIS technical skills including (but not limited to): hardware, software and network configurations; basics of application development; end-user involvement and requirements; open vs closed source software; selecting and building computers. Recognize, discuss and evaluate a variety of core Information Assurance skills including (but not limited to): symmetric and asymmetric encryption; social engineering; steganography; program and o/s security; authentication; network attacks and controls; Spears School of Business Information Assurance Management Page 1 of 7

the administration, risk management and economics of cyber security; legal and ethical issues of information assurance. IMPORTANT DATES January 14, 2015 March 6-11, 2015* April 24-April 29, 2015* *Dates are subject to change LECTURES Class begins Mid-term examination (D2L) Final examination (D2L) Most presentations will be accompanied by MS PowerPoint slides. Some guest speakers may be included in the program, and all of the material they present is subject to being on an exam/quiz. Current events will be emphasized, and students will be expected to contribute their findings from both the popular and trade press. Current events may be included in examinations. E-mail may be used for faculty/student communications. When sending email please always include: SUBJECT LINE: TCOM 5223, last name, subject BODY OF EMAIL: TCOM 5223, your full name E-mail to me without the course number in the subject line MAY be filtered and discarded as spam. TEXTBOOK The REQUIRED textbook is: Whitman, Michael E. and Herbert J. Mattord. Management of Information Security, 4 th Edition Thompson Learning, Inc. ISBN 1-285-06229-9. Optional References Security in Computing, 4 th Edition by Charles P. Pfleeger and Shari Lawrence Pfleeger. 2007, Prentice Hall Publishers. ISBN 0-13-239077-9 Spears School of Business Information Assurance Management Page 2 of 7

GRADES Your final grade will be determined by the weighted sum of all grading items, according to the grading scheme table below. Each of the grading categories will include one or more grading items. Please note that some items within a category may not have the same weight as the other items within the same category. Grading Category Weight Participation (Current Events & Attendance) 10% Final Project 20% Research/Term Paper 10% Assignments, Review Questions, Chapter Exams 40% Exams (Midterm & Final) 20% Total 100% Letter Grades will be assigned as: Total Weighted Score Grade >= 90.00 A >= 80.00 B >= 70.00 C >= 60.00 D <= 59.99 F GRADE CATEGORIES Below are explanations for each grading category. Please note any questions about grades must be brought to the attention of the instructor within seven calendar days of receiving the grade. No grade changes will be considered after seven days. Midterm and Final Exams (20%) The mid-term examination will cover material through Chapter 6, and may consist of Essay, True/False, multiple choice, and multi-select questions. The final examination will be comprehensive in scope, but will emphasize the second half, and may consist of Essay, True/False, multiple choice, and multi-select questions. Spears School of Business Information Assurance Management Page 3 of 7

Both the midterm and final examinations will be conducted via D2L, and taken at a time and place of your choosing. These exams will be open book, open note. No proctors will be needed. Students must take the exam with no help from others. Participation (10%): Attendance Punctual and regular class attendance is expected of all students. Each student is expected to attend every class. A sign in sheet will be available at the beginning of each class period for students to sign in. If you do not sign in, records will indicate that you are absent. Since each part of this course builds on previous material, it is essential that students keep up with the progress of the class. If it is not possible to attend class, you must tell the instructor in advance to be excused. Please note that some supplemental lecture materials may not be available elsewhere and you are responsible for getting them from the instructor or classmates. If you miss a class, identify what you have missed and take appropriate measures to catch up prior to the next class. Weekly Current Event Articles All students are required to participate in the discussion board. Every week students should provide a brief overview (2-5 sentences) and a link to an article about a current event (less than 2 months old) in Telecommunications, Information Technology or Cyber Security. Students can comment about other student s post in addition to posting their own. Failure to post will count against the attendance/participation grade for the week. NOTE FOR ONLINE STUDENTS: The Weekly Current Event Article alone will be used for the Attendance Grade. Assignments, Review Questions, Chapter Exams (40%) There will be several assignments used to assess student learning including (but not limited to) review questions, chapter exams, cases, labs, etc. All assignments should be turned into the appropriate Dropbox by the Date indicated. It is expected that students will complete all reading assignments prior to the relevant class session. Assignments are to be turned in via D2L and will require you to have a computer with Internet access. The instructor is not liable for any loss of material submitted. Please keep a back-up copy of all material that you submit. Do not submit electronic media that may contain confidential information (e.g., from your employer), since its safety, security against loss, destruction or tampering cannot be guaranteed by the instructor. The student is responsible to take all steps to protect information that you consider to be mission critical for yourself. Review Questions will be available via D2L in the quiz section. You are to open the quiz and answer the questions presented. Time is unlimited and you may use as much time as necessary to answer the questions prior to the due date and time. The Review Questions will automatically close at the designated time on the due date. Chapter Exams will be available via D2L in the quiz section. You are to open the quiz and answer the questions presented. The exam has a limited amount of time. You will only have one attempt for the test. The exam is open book, open notes and does not require a proctor. Students must take the exams with no help from others. Spears School of Business Information Assurance Management Page 4 of 7

The exam will automatically close at the designated time on the due date regardless of whether you have finished the exam or not. FINAL PROJECT (20%) The final project will give the student the opportunity to demonstrate what they have learned during the semester regarding Information Assurance Management. Students will be expected to provide a research paper and a make a presentation. The instructor will provide specific instructions for the project. RESEARCH/TERM PAPER (10%) Graduate students will be required to write a term paper related to a topic of the student s choice related to cyber security, networks, or telecommunications. Make mention of any applicable topics covered in class (e.g. contingency planning). LATE WORK Late Work will not be accepted. Assignments are past due if not submitted by the due date and time specified. Students missing assignments or exams without notifying the instructor in advance can expect to receive a zero. In-class projects cannot be made up. At the instructor s discretion make-ups may be available for reduced credit. Academic Integrity Policy Oklahoma State University is committed to the maintenance of the highest standards of integrity and ethical conduct of its members. This level of ethical behavior and integrity will be maintained in this course. Participating in a behavior that violates academic integrity (e.g., unauthorized collaboration on homework or assignments, plagiarism, multiple submissions of the same assignment, cheating on examinations, fabricating information, helping another person cheat, having unauthorized advance access to examinations, altering or destroying the work of others, and fraudulently altering academic records) will result in your being sanctioned. Violations may subject you to disciplinary action including the following: receiving a failing grade on an assignment, examination or in the course, receiving a notation of a violation of academic integrity on your transcript, and being suspended from the University. You have the right to appeal the charge. Contact the Office of Academic Affairs, 101 Whitehurst, (405) 744-5627. See also http://academicintegrity.okstate.edu. It is expected that all work submitted (papers, analyses, quizzes, examinations, homework, etc.) will be the student s individual work. It is intended for students to refer to journals and other relevant outside sources, evaluate their findings in light of the current scenario, draw appropriate conclusions from their research, and then present their conclusions in a straightforward and convincing manner. Reference to resources on the Internet (with proper citation) is acceptable, but copy and paste IS NOT acceptable. The English language is important in the information technology industry, and it is important in this class. Grammar, usage and spelling in all student work will be graded. Attachment from Academic Affairs Forms a part of this syllabus, and is to be read. See additional documents in the syllabus section of D2L. Students with Disabilities According to the Americans with Disabilities Act, it is the responsibility of each student with a disability to notify the University of his or her disability and to request accommodations. If any Spears School of Business Information Assurance Management Page 5 of 7

member of this class feels that he or she has a disability and needs special accommodation of any nature whatsoever, the instructor will work with you and the OSU-Tulsa Office of Student Disability Services to provide reasonable accommodations to ensure that you have a fair opportunity to perform in this class. Please advise the instructor of such a disability and the desired accommodations at some point before, during or immediately after the first scheduled class period. COURSE TOPICS AND DATES (tentative) UNIT TOPICS HOMEWORK (by dropbox due date) 0 Introductions None Syllabus Start Chapter 1 1 Introduction to the Management of Review Questions CH 1 Information Security Principles of Info Security Mgmt Chapter 1 Exam Project Mgmt Project Mgmt Tools LECTURE DATES (tentative) 1-14-15 1-21-15 2 Planning for Security Roles of Planning Strategic Planning Information Security Governance 3 Planning for Contingencies Components of Contingency Planning Business Resumption Testing Contingency Plans 4 Information Security Policy Enterprise Info Sec Policy Issue Specific Info Sec Policy System Specific Info Sec Policy Guidelines for Effective Policy SP 800-18 Guide to Developing Plan for Federal Systems 5 Developing the Security Program Organizing for Security Info Sec within Organization Security Roles and Titles Security Education Training Awareness Administering Security Trusted Systems Operating System Security Review Questions CH 2 Chapter 2 Exam Review Questions CH 3 Chapter 3 Exam Review Questions CH4 Chapter 4 Exam Review Questions CH 5 Chapter 5 Exam 1-28-15 2-4-15 2-11-15 2-18-15 6 Security Management Models Access Control Models Security Architecture Models Security Mgmt Models Review Questions CH 6 Chapter 6 Exam 2-25-15 Spears School of Business Information Assurance Management Page 6 of 7

7 Security Management Practices Review Questions CH 7 3-4-15 Benchmarking Chapter 7 Exam Performance Mgmt Certification and Accreditation MIDTERM EXAM REVIEW FOR MIDTERM Opens 3-6-15 Close 3-11-15 8 Risk Management: Identifying and Review Questions CH 8 3-11-15 Assessing Risk Chapter 8 Exam Risk Mgmt Risk Identification Risk Assessment Results of Risk Assessment SPRING BREAK SPRING BREAK SPRING BREAK MARCH 16-20, 2015 MARCH 16-20, 2015 9 Risk Management: Controlling Risk Review Questions CH 9 3-25-15 Risk Control Strategies Chapter 9 Exam Risk Control Strategies Managing Security Risk Economics of Cyber Security 10 Protection Mechanisms Review Questions CH 10 4-1-15 Access Controls Chapter 10 Exam Firewalls Labs Intrusion Detection Systems Remote Access Wireless Scanning and Analysis Encryption Steganography Network Security Quantum Computing 11 Personnel and Security Review Questions CH 11 4-8-15 Staffing Chapter 11 Exam Credentials Policies/Practices Authentication Social Engineering 12 Law and Ethics Review Questions CH 12 4-15-15 Info Sec and Law Chapter 12 Exam Ethics in Info Sec Liability Managing Investigations Final Project/Presentation Final Project 4-22-15 FINAL EXAM Final Exam Opens 4-23-15 Closes 4-29-15 NOTE: This schedule is tentative and is subject to change at the discretion of the instructor. If changes are made the instructor will inform students. Spears School of Business Information Assurance Management Page 7 of 7