Professional Documents
Culture Documents
College of Information Systems & Technology CMGT/441 Introduction to Information Systems Security Management
Copyright 2010, 2009 by University of Phoenix. All rights reserved.
Course Description This course introduces security principles and management issues that IT professionals must consider. The course surveys current and emerging security practices and processes as they relate to; information system, systems development, operating systems and programming, database development and management, networking and telecommunications, and the Internet. Policies Faculty and students/learners will be held responsible for understanding and adhering to all policies contained within the following two documents: University policies: You must be logged into the student website to view this document. Instructor policies: This document is posted in the Course Materials forum.
University policies are subject to change. Be sure to read the policies at the beginning of each class. Policies may be slightly different depending on the modality in which you attend class. If you have recently changed modalities, read the policies governing your current class modality. Course Materials Stallings, W., & Brown, L. (2008). Computer security principles and practice. Pearson Education, Inc. Article References Ainsworth, M. (2009). The business continuity planning process. Faulkner Information Services, 1-15. Barr, J. G. (2010). Business continuity for web sites. Faulkner Information Services, 1-9. Green, J. (2010). Identity management market trends. Faulkner Information Services, 1-10. Shaw, R. (2009). Intrusion prevention systems market trends. Faulkner Information Services, 1-8. Spring, K. (2008). IBM tivoli security event management. Faulkner Information Services, 1-9. Barr, J. G. (2009). Managing RFID data. Faulkner Information Services, 1-9. Walli, B. (2009). Common criteria overview. Faulkner Information Services, 1-10. Barr, J. G. (2010). Risk management software market trends. Faulkner Information Services, 1-9. Barr, J. G. (2011). Biometrics market trends. Faulkner Information Services, 1-7. All electronic materials are available on the student website.
Details
Objectives 1.1 Recognize the importance of IT security implementation. 1.2 Identify major security issues associated with physical and operating system security. 1.3 Describe basic advantages and disadvantages among the various security implementations. Read the course description and objectives. Review the Learning Team Toolkit. NOTE: TestOut LabSims are available for this course. See Week One, Course Materials Page. Read Ch. 1, Overview, of Computer Security Principles and Practice. Read Ch. 2, Cryptographic Tools, of Computer Security Principles and Practice. Read Ch. 3, User Authentication, of Computer Security Principles and Practice. Read Ch. 4, Access Control, of Computer Security Principles and Practice. Read Ch. 5, Database Security, of Computer Security Principles and Practice. Read the Week One Read Me First. Read this weeks Electronic Reserve Readings. Participate in class discussion. Respond to weekly discussion questions. Complete the Learning Team Charter. The Learning Team project for this course, due in Week Five, is in the form of a Service Request from Riordan Manufacturing. It will be necessary for the Learning Team to access Service Request: SRrm-013, Information Systems Security Review.
Due
Points
Course Preparation
Readings
2 3
Due
Points
Readings
Read Ch. 9, Firewalls and Intrusion Prevention Systems, of Computer Security Principles and Practice. Read Ch. 10, Trusted Computing and Multilevel Security, of Computer Security Principles and Practice. Read the Week Two Read Me First. Read this weeks Electronic Reserve Readings. Participation Discussion Questions Learning Team Instructions Individual Participate in class discussion. Respond to weekly discussion questions. Draft a 2-3 page description of the physical and network security issues and concerns at each Riordan plant. Using various Internet sources, find an article or website on an information security topic that is of interest to you. Prepare a 1-2 page paper evaluating the article or website. 7/18/11 7/18/11 2 3 5 15
Due
Points
Readings
Due
Points
Readings
Due
Points
Readings
Computer Security Principles and Practice. Read Ch. 17, IT Security Controls, Plans and Procedures, of Computer Security Principles and Practice. Read Ch. 18, Legal and Ethical Aspects, of Computer Security Principles and Practice. Read the Week Five Read Me First. Read this weeks Electronic Reserve Readings. Participation Discussion Questions Learning Team SR-rm-013 Project Learning Team SR-rm-013 Presentation Participate in class discussion. Respond to weekly discussion questions. Finalize and submit an 8-10 page Learning Team paper. Prepare a Microsoft PowerPoint presentation. 8/8/11 8/8/11 2 3 10 5