Course Description
The course focuses on the core concepts of Information Systems Security and related issues. It deals with general introduction of information security, cybersecurity, cryptographic concepts, network security in general, operating systems and database security in particular. It also highlights the importance information security governance and secure policies implementation at organizational level.
Required text
Charles P. Pfleeger , Shari Lawrence Pfleeger, Jonathan Margulies, Security in Computing, Fifth Edition, ISBN-13: 978-0134085043, Prentice Hall;
Course content
- Introduction to Information Security
- Data protection
- Detection and reaction
- Security Threats
- Confidentiality, Integrity, Availability Services
- Authentication and Authorization
- Security Policies
- Risk Management
- Encryption, Monitoring, Perimeter technologies
- Networked/distributed System security.
- Firewalls
- Public Key Infrastructure (PKI).\ Credentials Identification and Authentication\ Bitcoin
- Access Controls.\ Computer Security
- Identity Management \ Security Policy and Standards.
- Security Tricks and Human Factor
- Vulnerabilities and the vulnerability Landscape
- Threat modeling and risk assessment
- Security management.
- The Security Process.
- Digital electronic systems security
- Secure telecommunications systems.
Learning outcomes
- Describe the concepts, issues and techniques of information, new threats and hacking techniques, network security, information security polices standards/governance, identity management, digital electronic systems security and secure e-businesses systems.
- Define fundamentals risk management and security technologies and systems vulnerability assessments.
- Summarize ways to protect computer systems from viruses and harmful software
- Illustrate computer security issues and policies
- Demonstrate ability to work effectively in group assignments and projects.
- Show respect and appropriate ethical behavior.
- Demonstrate acceptance of constructive criticism
- Show effective listening skills.
- Demonstrate effective written, verbal and non-verbal communication skills.
- Demonstrate effective and ethical use of IT
- Illustrate the use of internet and other relevant databases for assignments and projects.
Course ID: MIS 445
Credit hours | Theory | Practical | Laboratory | Lecture | Studio | Contact hours | Pre-requisite | 3 | - | MIS 206 |
---|