Course Outline

MISA 532 : Integrated Threat Warning and Attack Assessment for Enterprise Information Systems

Preview Workflow

Viewing: MISA 532-WW : Integrated Threat Warning and Attack Assessment for Enterprise Information Systems

Last approved: Wed, 20 Jan 2016 14:11:04 GMT

Last edit: Wed, 20 Jan 2016 14:11:03 GMT

MISA 532-WW
Campus
Worldwide
College of Business (WBUAD)
MISA
532
Integrated Threat Warning and Attack Assessment for Enterprise Information Systems
3
Virtually every organization large or small faces a non-stop demand to be connected -- with competitors and customers, with regulators and suppliers, and especially with its own shareholders, stakeholders and employees. The sheer volumes of data exchanged and their complexity and sophistication are growing faster than ever before, which makes it even more difficult for organizations to detect, isolate and characterize potential hazards, and separate the accidents or non-deliberate from potentially hostile actions. Faced with this ever-increasing volume of more complex information interchange, organizations must use more powerful and sophisticated techniques to help sift suspicious network activity from routine traffic. Some of the most promising of these increasingly sophisticated monitoring techniques employ aspects of machine learning. This course provides the foundational knowledge for appropriately deploying those techniques. Topics include security risks and vulnerabilities, mobile systems, social networks, and ways to enhance system security. Prerequisites: MISA 501 and MISA 502, or approval of the Program Chair

This course provides an understanding of what activities have historically constituted attacks, as well as sources of risks and vulnerabilities. As relates to security, this course also provides an understanding of the network characteristics of mobile devices; the greatest proportion of network devices in many countries. Familiarity with methods of visualizing and monitoring complex system activity is provided, as is an understanding of approaches for enhancing system security.

Upon completing this course, the student will be able to: Understand the continually-evolving nature of the hazards, risks and threats that face information-intensive business and organizational operations. Explain the management and technical challenges of conducting information systems threat warning, intrusion detection, monitoring and attack verification activities. Understand the role machine learning plays in sophisticated security systems. Plan and manage the selection, implementation and use of information security analytics, visualization, monitoring and surveillance capabilities. Develop plans and programs that provide their organization with flexible responses to emerging vulnerabilities and methods of attack. Plan and manage risk assessment and vulnerabilities assessments for information systems and processes that an organization depends upon. Make the business case for the right mix of monitoring, surveillance, detection and other information security and assurance activities and techniques.

Located on the Daytona Beach Campus, the Jack R. Hunt Library is the primary library for all students of the Worldwide Campus. The Chief Academic Officer strongly recommends that every faculty member, where appropriate, require all students in his or her classes to access the Hunt Library or a comparable college-level local library for research. The results of this research can be used for class projects such as research papers, group discussion, or individual presentations. Students should feel comfortable with using the resources of the library. 


Web & Chat: http://huntlibrary.erau.edu
Email:  library@erau.edu
Text: (386) 968-8843
Library Phone:  (386) 226-7656 or (800) 678-9428
Hourshttp://huntlibrary.erau.edu/about/hours.html
 

N/A
N/A

Written assignments must be formatted in accordance with the current edition of the Publication Manual of the American Psychological Association (APA) unless otherwise instructed in individual assignments.

ActivityPercent of Grade
Input Grading Item100

Undergraduate Grade Scale

90 - 100% A
80 - 89% B
70 - 79% C
60 - 69% D
0 - 60% F

Graduate Grade Scale

90 - 100% A
80 - 89% B
70 - 79% C
0 - 69% F
Steve Chadwick - 2/25/2015
chadw202@erau.edu
Wendi Kappers - 2/25/2015
KAPPERSW@erau.edu
Aaron Glassman - 2/25/2015
glassf10@erau.edu
Dr. Bobby McMasters - 2/25/2015
mcmas245@erau.edu
PO#NameDescription
1-5 Master of Science in Information Security and Assurance Understand the interdisciplinary aspects (technical, business, management, and policy) of information assurance and information systems and organizational security.
2. Assess and manage the identification of and response to the changing nature of the information risks and information security challenges that increasingly complex, distributed organizations face.
3. Establish governance policies and management mechanisms necessary to develop, acquire, and operate sustainable, cost-effective secure information infrastructures.
4. Integrate various ethical, legal, technological and professional perspectives, both local and global, along with data protection and information assurance perspectives, throughout the various MIS decision making and managerial and leadership processes.
5. Manage and direct the development and operational use of information security and assurance procedures, policies and technologies throughout the organization.
Key: 337