|
Apr 19, 2024
|
|
|
|
ITIA 2310 - Information Security Policies & Risk Management Credit Hours: 3.00 Prerequisites: ITIA 1200
(formerly ITIA 1400 and ITIA 2300)
Students will analyze existing laws and policies and explain how they affect the security of a company or its users. They will use project-based assignments to write security policies. Students will also analyze existing systems for vulnerabilities and risks and make recommendations for mitigation. Provided a scenario where a system breach has occurred, students will recommend the appropriate response. Students will create a basic risk assessment report for a fictional company.
Location: Online only
Contact Hours: 3 Billable Contact Hours: 3 OUTCOMES AND OBJECTIVES Outcome 1: Explain how a law or policy affects the security of a company or its users.
Objectives:
- Describe how the type of legal dispute (civil, criminal, private) affects the evidence used to resolve it.
- Describe the responsibilities related to the handling of information about vulnerabilities.
- Describe the major components of laws (example: FERPA, HIPAA) and policies that relate to cyber security.
Outcome 2: Recommend appropriate measures to prevent or respond to a computer system compromise.
Objectives:
- Analyze common security failures and identify specific design principles that have been violated.
- Describe appropriate measures to be taken should a system compromise occur.
- Describe potential system attacks and the actors that might perform them.
Outcome 3: Recommend security technologies/methods to reduce vulnerabilities and risks.
Objectives:
- Identify vulnerabilities and risks in a typical system.
- Explain which security technologies/methods mitigate specific vulnerabilities and risks.
- Analyze data from a security breach.
Outcome 4: Prepare a security policy and basic risk assessment.
Objectives:
- Write a security policy.
- Create a basic risk assessment.
COMMON DEGREE OUTCOMES (Bulleted outcomes apply to the course)
- 1. The graduate can integrate the knowledge and technological skills necessary to be a successful learner.
|
- 2. The graduate can demonstrate how to think competently.
|
- 3. The graduate can demonstrate how to employ mathematical knowledge.
|
- 4. The graduate can demonstrate how to communicate competently.
|
- 5. The graduate is sensitive to issues relating to a diverse, global society.
|
COURSE CONTENT OUTLINE
- Laws and policies related to cyber security
- System attacks and failures
- Risks and vulnerabilities
- Mitigation strategies
- Basic risk assess
Primary Faculty Nabozny, Keith Secondary Faculty Associate Dean Johnson, Elise Dean Balsamo, Michael
Official Course Syllabus - Macomb Community College, 14500 E 12 Mile Road, Warren, MI 48088
Add to Favorites (opens a new window)
|
|