ÏæÑå ÇÍÑÇÒ åæیÊ
Course Code: ISSC364 Course ID: 4401 Credit Hours: 3 Level: Undergraduate
This course examines a broad range of network security issues. It explores how access controls protect resources against unauthorized viewing, tampering, or destruction and serves as a primary means of ensuring privacy, confidentiality, and prevention of unauthorized access and disclosure. It focuses on access control, such as components, processes, controls, and authentication, as well as security breaches, organizational behavior and social engineering, physical security, remote access control, public key infrastructure and encryption, cryptography, testing, and information assurance. Requires CITRIX CLIENT SOFTWARE INSTALLATION FOR ONLINE VIRTUAL LABS accessibility.
Registration Dates | Course Dates | Start Month | Session | Weeks |
---|---|---|---|---|
05/29/2023 - 11/03/2023 | 11/06/2023 - 12/31/2023 | November | Fall 2023 Session I | 8 Week session |
08/28/2023 - 02/02/2024 | 02/05/2024 - 03/31/2024 | February | Winter 2024 Session I | 8 Week session |
The successful student will fulfill the following learning objectives:
CO-1: Explain how to access risk and its impact on access control:
CO-2: Describe Access Control Policies, Standards, Procedures, and Guidelines
CO-3: Define Unauthorized Access and Security Breeches
CO-4: Discuss Human Nature, Organizational Behavior and Social Engineering
CO-5: Describe Access Control for Information Systems
CO-6: Identify Planning Considerations for Physical Security and Access Control
CO-7: Implement Access Control Systems
CO-8: Identify Access Control Solutions for Remote Worker
CO-9: Discuss Public key infrastructure, Encryption and Cryptography
CO-10: Describe the Elements of Information Assurance
The grading will be based on 6 graded assignments, 4 Peer Discussion Forum postings, an individual project proposal paper with acknowledgement, outline, presentation and final project proposal, as well as one open book quiz.
All assignments, Forum question responses, and the quiz are due by 12:00 midnight Eastern Time Sunday of the week assigned.
Project Paper (Proposal Acknowledgement, Outline, PowerPoint
Presentation, and Paper) Topics:
Week 2: Project Proposal Acknowledgement due
Week
4: Project Proposal Outline due
Week 7: PowerPoint Presentation due
Week 8: Project Proposal Final report and Revised Presentation (if revision required)
Course Project (15%)
This course project is intended to assess your ability to
comprehend and apply the basic concepts related to
information security management, such as the following:
Your ability to execute the tasks within these information security domains and others will be evaluated against the learning objectives as identified and described in previous lessons of instruction for this course.
Required Source Information and Tools
You will require the following resources to complete this project:
Introduction
User identification, authentication, and authorization are essential in developing, implementing, and maintaining a framework for information system security. The basic function of an information system security framework is to ensure the confidentiality and the integrity, as well as the availability of systems, applications, and data. Certain information security implementation and management knowledge is required of network administrators, IT service personnel, management, and IT security practitioners, such as information security officers, security analysts, and domain administrators.
You are provided with the text sheet named “Integrated Distributors Incorporated” (Project.TS1.doc) to complete this project. You play the dual role of an IT architect and IT security specialist working for Integrated Distributors Incorporated (IDI), a multi-national organization with offices in several countries. Your instructor for this course plays the role of the chief information officer (CIO). Your peers play the role of selected technology staff. Each of the organization’s locations is operating with different information technologies and infrastructure—IT systems, applications, and databases. Various levels of IT security and access management have been implemented and embedded within their respective locations.
Your goals as the IT architect and IT security specialist are to:
Name | Grade % |
---|---|
Discussions | 20.00% |
Week 1: Introduction and Privacy | 5.00% |
Week 3: Security Breaches | 5.00% |
Week 5: Biometric Methods | 5.00% |
Week 7: PKI and Encryption | 5.00% |
Assignments | 30.00% |
Assignment 1 - Due Week 1 | 5.00% |
Assignment 2 - Due Week 2 | 5.00% |
Assignment 3 | 5.00% |
Assignment 4 | 5.00% |
Assignment 5 | 5.00% |
Week 6: Case Study | 5.00% |
Labs | 20.00% |
Week 1 Lab Assignment | 2.86% |
Week 2 Lab Assignment | 2.86% |
Week 3 Lab Assignment | 2.86% |
Week 4 Lab Assignment | 2.86% |
Week 6 Lab Assignment | 2.86% |
Week 7 Lab Assignment | 2.86% |
Week 8 Lab Assignment | 2.86% |
Quiz | 5.00% |
ISSC 364 Quiz | 5.00% |
Project | 25.00% |
Project Proposal Acknowledgement | 2.00% |
Week 4: Project Outline | 4.00% |
Week 7: Project Presentation | 4.00% |
Week 8: Final Project | 15.00% |