Course Outline

MGMT 386 : Fundamentals of Information Systems Security

Preview Workflow

Viewing: MGMT 386-WW : Fundamentals of Information Systems Security

Last approved: Wed, 20 Jan 2016 13:29:11 GMT

Last edit: Wed, 20 Jan 2016 13:29:10 GMT

MGMT 386-WW
Campus
Worldwide
College of Business (WBUAD)
MGMT
386
Fundamentals of Information Systems Security
3
This course focuses on new risks, threats, and vulnerabilities in a digital world. The integration of the Internet and broadband communications into our everyday lives has created a need for information system security. Furthermore, compliance laws require organizations to protect and secure privacy data and reduce liability.

The purpose of this course is to introduce students to the principles of Information Security. Learners will be exposed to a comprehensive coverage that includes a historical overview of information security, discussions on risk management and security technology, current certification information, and more. The course builds on internationally recognized standards and bodies of knowledge to provide the knowledge and skills students need for their future roles as business decision-makers. Information security in the modern organization is a management issue which technology alone cannot answer; it is a problem that has important economic consequences for which management will be held accountable.

Upon course completion, the student will be able to:

1. Define information security and identify its key terms, critical concepts, and evolvement overtime.

2. Describe the information security roles of professional within an organization, and Compare and contrast the phases of security systems development life cycle.

3. Demonstrate organizations’ business need for information security; and describe where and how the information security function should be positioned within organizations.

4. Identify the threats posed to information security; differentiate threats to the information within systems from attacks against the information within systems; and evaluate alternative strategies in defending against information security threats.

5. Differentiate laws, ethics, and cultures in information security and identify major laws that affect the practice of information security,

6. Illustrate the importance of risk management in information security and describe how risk is identified, assessed, and mitigated.

7. Define management’s role in the development, maintenance, and enforcement of information security policy, standards, practices, procedures, and guidelines; and discuss how an organization institutionalizes its policies, standards, and practices using education, training, and awareness programs.

8. Describe what an information security blueprint is, what its major components are, and explain how it supports the information security program.

9. Explain what contingency planning is and how it relates to incident response planning, disaster recovery planning, and business continuity planning.

10. Recognize the important role of access control, fire walls, authentication and authorization, content filtering, virtual private networks, Instruction Detection Systems, and other technologies in protecting information systems.

11. List the recommended security management models; define a model for a full maintenance program; and identify the key factors involved in monitoring the external and internal environment.

Located on the Daytona Beach Campus, the Jack R. Hunt Library is the primary library for all students of the Worldwide Campus. The Chief Academic Officer strongly recommends that every faculty member, where appropriate, require all students in his or her classes to access the Hunt Library or a comparable college-level local library for research. The results of this research can be used for class projects such as research papers, group discussion, or individual presentations. Students should feel comfortable with using the resources of the library. 


Web & Chat: http://huntlibrary.erau.edu
Email:  library@erau.edu
Text: (386) 968-8843
Library Phone:  (386) 226-7656 or (800) 678-9428
Hourshttp://huntlibrary.erau.edu/about/hours.html
 

N/A
N/A

Written assignments must be formatted in accordance with the current edition of the Publication Manual of the American Psychological Association (APA) unless otherwise instructed in individual assignments.

ActivityPercent of Grade
Input Grading Item100

Undergraduate Grade Scale

90 - 100% A
80 - 89% B
70 - 79% C
60 - 69% D
0 - 60% F

Graduate Grade Scale

90 - 100% A
80 - 89% B
70 - 79% C
0 - 69% F
Amro Saud - 2/16/2015
sauda1@erau.edu
Peter O’Reilly - 2/16/2015
oreillyp@erau.edu
Aaron Glassman - 2/16/2015
glassf10@erau.edu
Bobby McMasters
mcmas245@erau.edu
PO#NameDescription
1-5 Bachelor of Science in Technical Management 1. Employ supervisory and management skills needed to effectively lead and support
others within a team environment across business functions. (BSTM PO-1)

2. Apply research to solve business problems and communicate the results effectively. (BSTM PO2)

3. Analyze and evaluate business functions and processes, identify needs, and structure business approaches using problem-solving, critical thinking, and established methodologies and standards. (BSTM PO-3)

4. Know key principles of business and management disciplines and their business applications; and the possible interrelationships to technical management practices especially in the field of aviation and aerospace. (BSTM PO-4)

5. Demonstrate a proficiency in identifying and solving problems related to the specialty areas of Information Systems, Information Security, Project Management, Logistics and Supply Chain Management, Engineering Science, or Occupational Safety and Health knowledge and the interrelationships to business and technical management practices. (BSTM PO-5)
Key: 392