Course Outline

MGMT 394 : Information Security Management

Preview Workflow

Viewing: MGMT 394-WW : Information Security Management

Last approved: Wed, 20 Jan 2016 13:31:23 GMT

Last edit: Wed, 20 Jan 2016 13:31:22 GMT

MGMT 394-WW
Campus
Worldwide
College of Business (WBUAD)
MGMT
394
Information Security Management
3
This course presents the concepts of information security in an enterprise approach to provide managers with tools and understanding needed to allocate scarce security resources. Introduction to security attributes and policies, developing effective and appropriate enterprise security plans, threats, vulnerabilities, and risk management concepts. Study of the architecture of an enterprise security system is developed to include a need analysis, levels of protection, detection strategies and correction/ recovery with crisis management, risk analysis, and business continuity plans.

This course focuses on the managerial aspects of information security, such as access control models, information security governance, and information security program assessment and metrics. Coverage of the foundational and technical components of information security is included to reinforce key concepts. Students will be able to identify and prioritize information assets, threats to information assets, information security strategy and architecture, and legal and public relations implications of security and privacy issues.

Upon course completion, the student will be able to:

1. Describe threats to information security.

2. Identify methods, tools and techniques for combating information security threats.

3. Identify types of attacks and problems that occur when systems are not properly protected.

4. Explain integral parts of overall good information security practices.

5. Identify and discuss issues related to access control.

6. Describe the need for and development of information security laws, policies, and identify guidelines and models for writing policies and ethical behavior.

7. Define risk management and explain why it is an important component of an information security strategy and practice.

8. Describe the types of contingency plans and the steps involved in developing each.

9. Identify security issues related to personnel decisions, and qualifications of security personnel.

Located on the Daytona Beach Campus, the Jack R. Hunt Library is the primary library for all students of the Worldwide Campus. The Chief Academic Officer strongly recommends that every faculty member, where appropriate, require all students in his or her classes to access the Hunt Library or a comparable college-level local library for research. The results of this research can be used for class projects such as research papers, group discussion, or individual presentations. Students should feel comfortable with using the resources of the library. 


Web & Chat: http://huntlibrary.erau.edu
Email:  library@erau.edu
Text: (386) 968-8843
Library Phone:  (386) 226-7656 or (800) 678-9428
Hourshttp://huntlibrary.erau.edu/about/hours.html
 

Written assignments must be formatted in accordance with the current edition of the Publication Manual of the American Psychological Association (APA) unless otherwise instructed in individual assignments.

ActivityPercent of Grade
Input Grading Item100

Undergraduate Grade Scale

90 - 100% A
80 - 89% B
70 - 79% C
60 - 69% D
0 - 60% F

Graduate Grade Scale

90 - 100% A
80 - 89% B
70 - 79% C
0 - 69% F
Denise Bollenback - 6/22/2015
bollenbd@erau.edu
Peter O’Reilly - 6/22/2015
oreillyp@erau.edu
Aaron Glassman - 6/22/2015
glassf10@erau.edu
Bobby McMasters
mcmas245@erau.edu
Key: 270