Preview Workflow

The CIM Courses system will be down temporarily undergoing routine maintenance.

Viewing: EMSE 6540 : Management of Information and Systems Security

Last approved: Sat, 17 Dec 2016 09:02:03 GMT

Last edit: Mon, 22 Aug 2016 01:59:41 GMT

School of Engineering and Applied Sciences
Engineering Management and Systems Engineering (EMSE)
EMSE
6540
Management of Information and Systems Security
Mgt of Info & Systems Security
Fall 2016
3
Course Type
Lecture
Default Grading Method
Letter Grade

No
No

Corequisites

25

Frequency of Offering
Every Year
Term(s) Offered
Fall
Are there Course Equivalents?
No
 
No
Fee Type


No


Information and information security defense techniques and countermeasures with defense fundamentals; critical infrastructure protection; network defense techniques such as designing firewall systems and IDS, VPNs, cryptographic solutions, Internet security protocols, and cyber security and information assurance tenants such as confidentiality, Integrity, availability, authentication and non-repudiation.
Upon completion of this course, the student should be able to: a. Identify and critically assess issues and concepts related to the protection of information and information systems. b. Define security attributes confidentiality, integrity, and availability. Describe confidentiality requirements for an enterprise environment. Describe integrity requirements for an enterprise environment. Describe availability requirements for an enterprise environment. c. Analyze and evaluate proposed or extant information security policies, practices and procedures in order to assess potential advantages and disadvantages that might flow from implementing them. Describe how confidentiality can be protected. Describe how integrity can be protected. Describe how availability can be protected. Describe how failures of protections can be detected. Describe how attacks can be detected. Describe how impacts from an attack can be mitigated. d. Use risk management principles to assess threats, vulnerabilities, countermeasures and impact contributions to risk in information systems. Perform a risk analysis for an environment. Create a management plan for security in an environment. e. Evaluate policies, strategies and standard operating procedures for securing information and communication systems. f. Identify and critically assess the legal, moral and ethical implications of behavior in an on-line world. g. Describe and use a systems engineering approach to define a security architecture for a given operational environment.
Uploaded a Course Syllabus

Course Attribute


cbeil (Mon, 22 Aug 2016 01:59:41 GMT): Updated effective term
Key: 2957