Course Outline

MISA 533 : Product and Systems Safety and Reliability: Issues for Information Assurance

Preview Workflow

Viewing: MISA 533-WW : Product and Systems Safety and Reliability: Issues for Information Assurance

Last approved: Wed, 20 Jan 2016 14:11:13 GMT

Last edit: Wed, 20 Jan 2016 14:11:12 GMT

MISA 533-WW
Campus
Worldwide
College of Business (WBUAD)
MISA
533
Product and Systems Safety and Reliability: Issues for Information Assurance
3
Technical risk is created whenever computing systems are integrated with products and services, as a computing failure cascades into the failure of the product or service that relies upon the technology. The management of cascading technical risks becomes more urgent, and therefore challenging, in the realm of safety-critical systems, where failure could potentially result in significant damage, physical losses, or loss of life. Ever-increasing reliance on computerization for the control of physical assets such as vehicles and production facilities creates an increased need to address product and systems safety and reliability. Information assurance principles can and should be applied throughout such environments to ensure continuous, reliable system function. Prerequisites: MISA 501 and MISA 502

This course provides methods and approaches to help systems designers and developers recognize potential risks in products and systems, and to apply information assurance and security principles to minimize or avoid risks where possible. Students will explore common uses of information systemsarchitectures that are embedded within environments that require high availability and reliability, such as transportation controls environments.

1.Understand common product and systems safety risks related to the integration or embedding of information technologies into critical systems. 2.Explain how product or service safety and reliability efforts directly support organizational objectives.3.Explain how secure design and development practices can support information assurance development objectives.4.Understand secure design and development practices for critical products and services.5.Explain how designing security and assurance into an information system is preferable over postponing the consideration of security concerns until after deployment of a product or service.

Located on the Daytona Beach Campus, the Jack R. Hunt Library is the primary library for all students of the Worldwide Campus. The Chief Academic Officer strongly recommends that every faculty member, where appropriate, require all students in his or her classes to access the Hunt Library or a comparable college-level local library for research. The results of this research can be used for class projects such as research papers, group discussion, or individual presentations. Students should feel comfortable with using the resources of the library. 


Web & Chat: http://huntlibrary.erau.edu
Email:  library@erau.edu
Text: (386) 968-8843
Library Phone:  (386) 226-7656 or (800) 678-9428
Hourshttp://huntlibrary.erau.edu/about/hours.html
 

N/A
N/A

Written assignments must be formatted in accordance with the current edition of the Publication Manual of the American Psychological Association (APA) unless otherwise instructed in individual assignments.

ActivityPercent of Grade
Input Grading Item100

Undergraduate Grade Scale

90 - 100% A
80 - 89% B
70 - 79% C
60 - 69% D
0 - 60% F

Graduate Grade Scale

90 - 100% A
80 - 89% B
70 - 79% C
0 - 69% F
Wendi Kappers - 2/25/2015
KAPPERSW@erau.edu
Aaron Glassman - 2/25/2015
glassf10@erau.edu
Dr. Bobby McMasters - 2/25/2015
mcmas245@erau.edu
PO#NameDescription
1-5 Master of Science in Information Security and Assurance . Understand the interdisciplinary aspects (technical, business, management, and policy) of information assurance and information systems and organizational security.
2. Assess and manage the identification of and response to the changing nature of the information risks and information security challenges that increasingly complex, distributed organizations face.
3. Establish governance policies and management mechanisms necessary to develop, acquire, and operate sustainable, cost-effective secure information infrastructures.
4. Integrate various ethical, legal, technological and professional perspectives, both local and global, along with data protection and information assurance perspectives, throughout the various MIS decision making and managerial and leadership processes.
5. Manage and direct the development and operational use of information security and assurance procedures, policies and technologies throughout the organization.
Key: 338