Course Outline

MISA 691 : Applied Methods

Preview Workflow

Viewing: MISA 691-WW : Applied Methods

Last approved: Wed, 20 Jan 2016 14:12:12 GMT

Last edit: Wed, 20 Jan 2016 14:12:11 GMT

MISA 691-WW
Campus
Worldwide
College of Business (WBUAD)
MISA
691
Applied Methods
3
This course challenges the student to integrate all aspects of their MSISA studies into a cohesive and comprehensive approach to a selected INFORMATION SECURITY and ASSURANCE problem. Students may elect to perform in-depth research, provide a detailed analysis of selected case studies, or conduct a real-world project. For instance, students may develop and evaluate a detailed business continuity management plan, or conduct an in-depth information risk assessment for an organization, develop a detailed risk management and treatment plan, or conduct a thorough analysis and evaluation of an existing information risk management plan. Quantitative and qualitative analytical methods should be considered essential to providing a rigorous, thoughtful, and well-supported final product.

This course provides the student the opportunity to bring together both the core competencies in the required core courses, as well as their selected concentration(s) and elective(s), to produce a comprehensive, balanced, and practical result.

Upon course completion, the student will be able to: Understand the interdisciplinary aspects (technical, business, management, and policy) of information assurance and information systems and organizational security. Assess and manage the identification of and response to the changing nature of the information risks and information security challenges that increasingly complex, distributed organizations face. Establish governance policies and management mechanisms necessary to develop, acquire, and operate sustainable, cost-effective secure information infrastructures. Integrate various ethical, legal, technological and professional perspectives, both local and global, along with data protection and information assurance perspectives, throughout the various MIS decision making and managerial and leadership processes. Manage and direct the development and operational use of information security and assurance procedures, policies and technologies throughout the organization.

Located on the Daytona Beach Campus, the Jack R. Hunt Library is the primary library for all students of the Worldwide Campus. The Chief Academic Officer strongly recommends that every faculty member, where appropriate, require all students in his or her classes to access the Hunt Library or a comparable college-level local library for research. The results of this research can be used for class projects such as research papers, group discussion, or individual presentations. Students should feel comfortable with using the resources of the library. 


Web & Chat: http://huntlibrary.erau.edu
Email:  library@erau.edu
Text: (386) 968-8843
Library Phone:  (386) 226-7656 or (800) 678-9428
Hourshttp://huntlibrary.erau.edu/about/hours.html
 

N/A
N/A

Written assignments must be formatted in accordance with the current edition of the Publication Manual of the American Psychological Association (APA) unless otherwise instructed in individual assignments.

ActivityPercent of Grade
Input Grading Item100

Undergraduate Grade Scale

90 - 100% A
80 - 89% B
70 - 79% C
60 - 69% D
0 - 60% F

Graduate Grade Scale

90 - 100% A
80 - 89% B
70 - 79% C
0 - 69% F
Wendi Kappers - 2/25/2015
KAPPERSW@erau.edu
Aaron Glassman - 2/25/2015
glassf10@erau.edu
Dr. Bobby McMasters - 2/25/2015
mcmas245@erau.edu
PO#NameDescription
1-5 Master of Science in Information Security and Assurance 1. Understand the interdisciplinary aspects (technical, business, management, and policy) of information assurance and information systems and organizational security.
2. Assess and manage the identification of and response to the changing nature of the information risks and information security challenges that increasingly complex, distributed organizations face.
3. Establish governance policies and management mechanisms necessary to develop, acquire, and operate sustainable, cost-effective secure information infrastructures.
4. Integrate various ethical, legal, technological and professional perspectives, both local and global, along with data protection and information assurance perspectives, throughout the various MIS decision making and managerial and leadership processes.
5. Manage and direct the development and operational use of information security and assurance procedures, policies and technologies throughout the organization
Key: 344