SECR 5080: Information Systems Security
Students examine the management of information security and data-processing facilities, including thefts of data, unauthorized uses of information technology, computer viruses, and methods of protecting information, with an emphasis on networked computers. The course covers information technology laws, issues of privacy, and security planning.
Must be capable of graduate work. Should have attended SECR 5000 and/or have experience in security management or have cleared attendance in advance with the instructor.
Course Level Learning Outcomes
After completing this course, students should have an explanation of :
- concept of confidentiality, integrity, and availability as applied to Information Systems Security
- authentication, authorization, and permission as applies to security policy.
- protection theory and strategy as applied to networks, computer, and communication devices.
- managerial roles in securing the Information Systems environment.
- cryptography as it applies to networking, operating systems, and data storage.
- technical controls and devices used to achieve secure environments.
- managerial controls used to achieve secure environments
- policy theory, application, and practice.
- risk assessment of networked computers, networking devices, and organizational practices.
- security models to include application development, network infrastructure, and physical facility.
- disaster planning and disaster recover models.
- laws and issues of privacy.
In addition, students will:
- know and explain the important terminology, facts, concepts, principles, and theories used in the field of Business and Organizational Security Management. These will consist of the mandatory topics taught in the pre-requisite, advanced core courses, and integrative capstone course.
- apply the important terminology, facts, concepts, principles and theories in the field of Business and Organizational Security Management to analyze simple to moderately complex factual security situations.
- creatively construct and implement moderately complex Business and Organizational Security Management solutions to real organizational problems using frameworks procedures, and methods derived from the individual security discipline of Information Systems Security.
- assess the effectiveness of their solutions by quantitatively or qualitatively measuring their results against theory-based criteria and standards of performance.
- utilize themselves as scholar-practitioners, capable of creatively synthesizing intellectual explanation of security models with methodological competencies and experience-based perceptual skills and judgment.
Please go to MBS Direct to find the appropriate textbooks for this course.
Please be aware when purchasing your textbooks that the International versions of the text may differ from the Domestic (North American) version required for your course.Click here for more information about textbooks for online courses..
The course will be concluded entirely online. Students are expected to participate in all course activities as assigned by the instructor. Course activities may include discussions, weekly assignments, quizes, case studies, and learner assessments. However, individual instructors may incorporate other activities into the course materials.
The GRADUATE catalog provides these guidelines adn grading options:
|A/A–||Superior graduate work|
|B+/B/B–||Satisfactory graduate work|
|C||Work that is barely adequate as graduate-level performance|
|CR||Work that is performed as satisfactory graduate work (B– or better). A grade of “CR” is reserved for courses designated by a department, involving internships, a thesis, practicums, or specified courses.|
|NC||Unsatisfactory graduate work (School of Education only)|
|F*||Work that is unsatisfactory *The School of Education (MAT, MA and EdS) does not utilize the “F” Grade.|
|ZF||An incomplete which was not completed within one year of the end of the course. ZF is treated the same as an F or NC for all cases involving GPA, academic warning, probation, and dismissal.|
|W||Withdrawn from the course|
A student in the School of Education may choose to receive Credit/No Credit, rather than a letter grade, by completing a grade choice form by the second week of classes. Education students must complete 33 credit hours with a B average or the equivalent.
Grades are available on the Internet to all students at the end of each scheduled term. (A hard copy is available upon request and may be requested online via the Academic Services Channel within Connections.)
University policies are provided in the current course catalog and course schedules. They are also available on the university website. This class is governed by the university’s published policies. The following policies are of particular interest:Academic Honesty
The university is committed to high standards of academic honesty. Students will be held responsible for violations of these standards. Please refer to the university’s academic honesty policies for a definition of academic dishonesty and potential disciplinary actions associated with it.Drops and Withdrawals
Please be aware that, should you choose to drop or withdraw from this course, the date on which you notify the university of your decision will determine the amount of tuition refund you receive. Please refer to the university policies on drops and withdrawals (published elsewhere) to find out what the deadlines are for dropping a course with a full refund and for withdrawing from a course with a partial refund.Special Services
If you have registered as a student with a documented disability at the Academic Resource Center (ARC) and are entitled to classroom or testing accommodations, please verify with your instructor at the beginning of the class that the instructor has received your accommodations letter from the ARC. If you have a disability and need academic accommodations but have not been documented with the ARC, please contact Barbara Stewart at (314)-968-7495 or email@example.com
Since every student is entitled to full participation in class without interruption, disruption of class by inconsiderate behavior is not acceptable. Students are expected to treat the instructor and other students with dignity and respect, especially in cases where a diversity of opinion arises. Students who engage in disruptive behavior are subject to disciplinary action, including removal from the course.Student Assignments Retained
From time to time, student assignments or projects will be retained by The Department for the purpose of academic assessment. In every case, should the assignment or project be shared outside the academic Department, the student's name and all identifying information about that student will be redacted from the assignment or project.Contact Hours for this Course
It is essential that all classes meet for the full instructional time as scheduled. A class cannot be shortened in length. If a class session is cancelled for any reason, it must be rescheduled.