Course Outline

MISA 507 : Quality Management for Information Assurance

Preview Workflow

Viewing: MISA 507-WW : Quality Management for Information Assurance

Last approved: Wed, 20 Jan 2016 14:10:12 GMT

Last edit: Wed, 20 Jan 2016 14:10:11 GMT

MISA 507-WW
Campus
Worldwide
College of Business (WBUAD)
MISA
507
Quality Management for Information Assurance
3
Quality management provides a systems engineering approach that focuses on process design to achieve objectives, without having to rely upon exhaustive testing or inspection of outputs to achieve desired outcomes. This course applies this concept across the life cycle of information in organizations, and the information systems that generate and make that information useful -- including the information systems used to keep the "front-line" systems alive and secure. Prerequisites: MISA 501 and MISA 502

By combining a strong quality management focus with information assurance practices and principles, this course shows students how to specify, develop, manage and use information systems – particularly those “behind the scenes” systems used to build and maintain the more visible management information systems that are vital to the organization.

Understand dimensions of quality throughout the Technical, Business, Management, and Policy domains. Explain how quality management techniques support the development of Trusted Systems that directly support organizational objectives. Understand the issues related to the integration of, and interaction between, Security and Dependability. Explain how quality management systems can support an information assurance mission. Develop information assurance and information security management programs and systems using quality management concepts. Understand how system properties of Resiliency, Dependability, and Fault Tolerance directly impact information assurance objectives. Explain how a reduction of recurring system faults and errors through defect analysis programs can improve systems security.

Located on the Daytona Beach Campus, the Jack R. Hunt Library is the primary library for all students of the Worldwide Campus. The Chief Academic Officer strongly recommends that every faculty member, where appropriate, require all students in his or her classes to access the Hunt Library or a comparable college-level local library for research. The results of this research can be used for class projects such as research papers, group discussion, or individual presentations. Students should feel comfortable with using the resources of the library. 


Web & Chat: http://huntlibrary.erau.edu
Email:  library@erau.edu
Text: (386) 968-8843
Library Phone:  (386) 226-7656 or (800) 678-9428
Hourshttp://huntlibrary.erau.edu/about/hours.html
 

N/A
N/A

Written assignments must be formatted in accordance with the current edition of the Publication Manual of the American Psychological Association (APA) unless otherwise instructed in individual assignments.

ActivityPercent of Grade
Input Grading Item100

Undergraduate Grade Scale

90 - 100% A
80 - 89% B
70 - 79% C
60 - 69% D
0 - 60% F

Graduate Grade Scale

90 - 100% A
80 - 89% B
70 - 79% C
0 - 69% F
Wendi Kappers - 2/24/2015
KAPPERSW@erau.edu
Aaron Glassman - 2/24/2015
glassf10@erau.edu
Dr. Bobby McMasters - 2/24/2015
mcmas245@erau.edu
PO#NameDescription
1-5 Master of Science in Information Security and Assurance . Understand the interdisciplinary aspects (technical, business, management, and policy) of information assurance and information systems and organizational security.
2. Assess and manage the identification of and response to the changing nature of the information risks and information security challenges that increasingly complex, distributed organizations face.
3. Establish governance policies and management mechanisms necessary to develop, acquire, and operate sustainable, cost-effective secure information infrastructures.
4. Integrate various ethical, legal, technological and professional perspectives, both local and global, along with data protection and information assurance perspectives, throughout the various MIS decision making and managerial and leadership processes.
5. Manage and direct the development and operational use of information security and assurance procedures, policies and technologies throughout the organization.
Key: 332