Course Outline

MISA 531 : Secure Information Systems Design

Preview Workflow

Viewing: MISA 531-WW : Secure Information Systems Design

Last approved: Wed, 20 Jan 2016 14:10:54 GMT

Last edit: Wed, 20 Jan 2016 14:10:53 GMT

MISA 531-WW
Campus
Worldwide
College of Business (WBUAD)
MISA
531
Secure Information Systems Design
3
Designing information systems with security and assurance goals in mind provides an important foundation to deploy secure solutions and support ongoing assurance in systems operations. Approaches that, in contrast, minimize the gathering of security requirements during design stages can be expected to result in substantial effort to engineer security into an existing system as the system is deployed. Adoption of secure design practices enables a much more efficient path to the deployment of secure systems. Secure design is an important concern for business analysts as they identify functional requirements, as well as to developers as they transform requirements and design elements into a working system. IT management strives to implement and deploy the system using secure systems design principles. But most importantly, it is as the business owners and operational managers assume functional ownership of deployed systems, and use it as they strive to build a resilient enterprise, that secure information systems design principles realize their greatest payback. Prerequisites: MISA 501 and MISA 502

This course provides methods and approaches to help information systems designers and developers identify and incorporate security and assurance requirements from the earliest stages of the development and deployment life cycle. A blending of design, development, and security concepts are examined to equip the student to combine theory and practice in the creation of secure systems.

Understand common security and assurance challenges in information systems and applications. Explain how secure design techniques support the development of secure information systems that directly support organizational objectives. Explain how secure design and development practices can support the enterprise information assurance mission. Develop secure design and development practices for information systems. Explain how designing security and assurance into an information system preferred over postponing the consideration of security concerns until after deployment.

Located on the Daytona Beach Campus, the Jack R. Hunt Library is the primary library for all students of the Worldwide Campus. The Chief Academic Officer strongly recommends that every faculty member, where appropriate, require all students in his or her classes to access the Hunt Library or a comparable college-level local library for research. The results of this research can be used for class projects such as research papers, group discussion, or individual presentations. Students should feel comfortable with using the resources of the library. 


Web & Chat: http://huntlibrary.erau.edu
Email:  library@erau.edu
Text: (386) 968-8843
Library Phone:  (386) 226-7656 or (800) 678-9428
Hourshttp://huntlibrary.erau.edu/about/hours.html
 

N/A
N/A

Written assignments must be formatted in accordance with the current edition of the Publication Manual of the American Psychological Association (APA) unless otherwise instructed in individual assignments.

ActivityPercent of Grade
Input Grading Item100

Undergraduate Grade Scale

90 - 100% A
80 - 89% B
70 - 79% C
60 - 69% D
0 - 60% F

Graduate Grade Scale

90 - 100% A
80 - 89% B
70 - 79% C
0 - 69% F
Wendi Kappers - 2/25/2015
KAPPERSW@erau.edu
Aaron Glassman - 2/25/2015
glassf10@erau.edu
Dr. Bobby McMasters - 2/25/2015
mcmas245@erau.edu
PO#NameDescription
1-5 Master of Science in Information Security and Assurance . Understand the interdisciplinary aspects (technical, business, management, and policy) of information assurance and information systems and organizational security.
2. Assess and manage the identification of and response to the changing nature of the information risks and information security challenges that increasingly complex, distributed organizations face.
3. Establish governance policies and management mechanisms necessary to develop, acquire, and operate sustainable, cost-effective secure information infrastructures.
4. Integrate various ethical, legal, technological and professional perspectives, both local and global, along with data protection and information assurance perspectives, throughout the various MIS decision making and managerial and leadership processes.
5. Manage and direct the development and operational use of information security and assurance procedures, policies and technologies throughout the organization.
Key: 336