Computer Information Systems
Principles of Information Security
This course examines the field of information security to prepare individuals for their future roles as business decision makers. This course provides the foundation for understanding the key issues associated with protecting information assets, determining the levels of protection and response to security incidents, and designing a consistent, reasonable information security system with appropriate intrusion detection and reporting features. In addition, the course also covers both the managerial and the technical aspects of this exciting discipline and addresses knowledge areas of CISSP (Certified Information Systems Security Professional) certification.
(A requirement that must be completed before taking this course.)
Upon successful completion of the course, the student should be able to:
- Examine real-life information security situations.
- Identify the threats posed to information security.
- Relate the history of computer security and how it evolved into information security.
- Investigate how risk is identified and assessed.
- Examine the difference between laws and ethics.
- Determine various approaches to firewall implementations.
- Examine what contingency planning is.
- Classify operating models of intrusion detection.
- Investigate the basic principles of cryptography.
Currently no sections of this class are being offered.