ITIA 2310 - Information Security Policies & Risk Management Credit Hours: 3.00 Prerequisites: ITIA 1200
(formerly ITIA 1400 and ITIA 2300)
Students will analyze existing laws and policies and explain how they affect the security of a company or its users. They will use project‑based assignments to write security policies. Students will also analyze existing systems for vulnerabilities and risks and make recommendations for mitigation. Provided a scenario where a system breach has occurred, students will recommend the appropriate response. Students will create a basic risk assessment report for a fictional company.
Billable Contact Hours: 3
Search for Sections OUTCOMES AND OBJECTIVES Outcome 1: Explain how a law or policy affects the security of a company or its users.Objectives: - Describe how the type of legal dispute (civil, criminal, private) affects the evidence used to resolve it.
- Describe the responsibilities related to the handling of information about vulnerabilities.
- Describe the major components of laws (example: FERPA, HIPAA) and policies that relate to cyber security.
Outcome 2: Recommend appropriate measures to prevent or respond to a computer system compromise. Objectives: - Analyze common security failures and identify specific design principles that have been violated.
- Describe appropriate measures to be taken should a system compromise occur.
- Describe potential system attacks and the actors that might perform them.
Outcome 3: Recommend security technologies/methods to reduce vulnerabilities and risks. Objectives: - Identify vulnerabilities and risks in a typical system.
- Explain which security technologies/methods mitigate specific vulnerabilities and risks.
- Analyze data from a security breach.
Outcome 4: Prepare a security policy and basic risk assessment. Objectives: - Write a security policy.
- Create a basic risk assessment.
COMMON DEGREE OUTCOMES (CDO) • Communication: The graduate can communicate effectively for the intended purpose and audience. • Critical Thinking: The graduate can make informed decisions after analyzing information or evidence related to the issue. • Global Literacy: The graduate can analyze human behavior or experiences through cultural, social, political, or economic perspectives. • Information Literacy: The graduate can responsibly use information gathered from a variety of formats in order to complete a task. • Quantitative Reasoning: The graduate can apply quantitative methods or evidence to solve problems or make judgments. • Scientific Literacy: The graduate can produce or interpret scientific information presented in a variety of formats.
CDO marked YES apply to this course: Communication: YES Critical Thinking: YES Information Literacy: YES Quantitative Reasoning: YES COURSE CONTENT OUTLINE - Laws and policies related to cyber security
- System attacks and failures
- Risks and vulnerabilities
- Mitigation strategies
- Basic risk assess
Primary Faculty Nabozny, Keith Secondary Faculty Associate Dean Evans-Mach, Patrick Dean Balsamo, Michael
Official Course Syllabus - Macomb Community College, 14500 E 12 Mile Road, Warren, MI 48088
Add to Favorites (opens a new window)
|