Course Outline

MISA 504 : Enterprise Systems Architectures for Information Assurance

Preview Workflow

Viewing: MISA 504-WW : Enterprise Systems Architectures for Information Assurance

Last approved: Wed, 20 Jan 2016 14:09:40 GMT

Last edit: Wed, 20 Jan 2016 14:09:39 GMT

College of Business (WBUAD)
Enterprise Systems Architectures for Information Assurance
Protection of information in systems architectures is a complex, multidisciplinary challenge. Maintaining the confidentiality, integrity, and availability of critical information in interconnected, dynamic architectures presents multiple dimensions of risk to the systems architect. It also challenges the architecture team that typically consists of product managers, designers, developers, project, program management as well as sales and marketing to clearly understand the technology, processes and tools needed for the architecture when delivering the architecture design to customers and suppliers. This course examines information assurance challenges in the context of complex systems with interconnected processes, complex product and technology design and enterprise domains. Topics to be covered include systems architectures, information assurance objectives, and systemic risk. Prequisites: MISA 501 and MISA 502

This course challenges the student to embrace two fundamental principles that form the basis of competitive advantage in the Internet Age. The first is that the enterprise perspective sees the organization as a system of systems, internally and externally; and that these systems run on information as their life’s blood. The second is that these information organizations are both learning organizations and decision-making by their very nature, and this places great reliance on the quality, accuracy, suitability, and timeliness of decision inputs. This is the information assurance “bottom line,” and students will learn how to generate such high-reliability systems-of-systems architectures, as a way of appreciating and managing the information processes that keep their organizations competitive.

Upon completion of the course, students will be able to do the following: Understand the interdisciplinary aspects (technical, business, management, and policy) of information assurance and information systems and organizational security. Discuss the risk profile of a complex systems environment. Respond to changes in risk profiles that result from ongoing system dynamics. Understand the governance and management challenges presented by the systems context. Differentiate between governance requirements for system components owned by the enterprise, or external third-parties. Discuss the technology transition lifecycle methods and strategies

Located on the Daytona Beach Campus, the Jack R. Hunt Library is the primary library for all students of the Worldwide Campus. The Chief Academic Officer strongly recommends that every faculty member, where appropriate, require all students in his or her classes to access the Hunt Library or a comparable college-level local library for research. The results of this research can be used for class projects such as research papers, group discussion, or individual presentations. Students should feel comfortable with using the resources of the library. 

Web & Chat:
Text: (386) 968-8843
Library Phone:  (386) 226-7656 or (800) 678-9428


Written assignments must be formatted in accordance with the current edition of the Publication Manual of the American Psychological Association (APA) unless otherwise instructed in individual assignments.

ActivityPercent of Grade
Input Grading Item100

Undergraduate Grade Scale

90 - 100% A
80 - 89% B
70 - 79% C
60 - 69% D
0 - 60% F

Graduate Grade Scale

90 - 100% A
80 - 89% B
70 - 79% C
0 - 69% F
Mike Wills - 2/24/2015
Wendi Kappers - 2/24/2015
Aaron Glassman - 2/24/2015
Dr. Bobby McMasters - 2/24/2015
1-5 Master of Science in Information Security and Assurance 1. Understand the interdisciplinary aspects (technical, business, management, and policy) of information assurance and information systems and organizational security.
2. Assess and manage the identification of and response to the changing nature of the information risks and information security challenges that increasingly complex, distributed organizations face.
3. Establish governance policies and management mechanisms necessary to develop, acquire, and operate sustainable, cost-effective secure information infrastructures.
4. Integrate various ethical, legal, technological and professional perspectives, both local and global, along with data protection and information assurance perspectives, throughout the various MIS decision making and managerial and leadership processes.
5. Manage and direct the development and operational use of information security and assurance procedures, policies and technologies throughout the organization.
Key: 329