Information Assurance and Security is 3513 mw 6: 00-7: 15 pm, mh 02. 16



Download 17.96 Kb.
Date conversion31.01.2017
Size17.96 Kb.
Information Assurance and Security

IS 3513

MW 6:00-7:15 PM, MH 2.02.16

Course Syllabus

Bachelor of Business Administration: Students will be able to

  • Use quantitative analysis and quantitative and non-quantitative reasoning to effectively identify and solve business problems.

  • Communicate, both orally and in writing, information and ideas pertinent to business decision-making.

  • Use current information technology to support business decision-making.

  • Identify ethical and legal issues in a business context and find alternatives that demonstrate ethical values.

Incorporate a global perspective in business decisions


Description


A topic of increasing importance and interest in the world of information systems and technology is security. For a variety of reasons, it is imperative that the information organizations store in their computer systems and networks be protected from unauthorized disclosure, modification, or destruction. This course will provide the student the opportunity to learn about the basic elements that comprise Information Assurance Security.



COURSE OBJECTIVES SUPPORTING B.B.A. PROGRAM GOALS

  • Complete four labs that show proficiency in using security related applications

  • Complete a paper that demonstrate the students ability to synthesize security and business related issues

  • Successfully complete two exams that show the students understand the basics of information assurance


Assumed Background


It is assumed that students in this class have a basic understanding of Operating Systems and Networks and that they have access to the Internet and a UNIX- or Windows- based PC.
Textbook

The required textbook that will be used for this class is: Principles of Computer Security, Conklin, White, Cothren, Williams, and Davis, McGraw Hill, 2016. ISBN-13: 978-0071835978 ISBN-10: 0071835970.



Graded Assignments


The grades for this course will be based on a standard 70% = C, 80% = B, 90%=A grading scheme. The final grades will be based on the following assignments:

Paper 1 100 points

4 Labs 400 points

Exams 250 points


Final Exam 250 points

TOTAL 1000 points



Instructor Data


The instructor for the course will be Professor Robert J. Kaufman robert.kaufman@utsa.edu Office hours are MW 5:150 – 5:45 pm or by appointment.
Misc. Policies:

Attendance will not be taken in class. A student missing class is responsible for obtaining information missed. Any late penalties for assignments will be outlined in the individual assignment handout. Please ensure pagers and cell phones are turned off during class – exceptions for unusual circumstances should be arranged in advance with the instructor. Any other special considerations for assignments or examinations should be cleared in advance with the instructor.



IS-3513

Class Schedule

1 Course Introduction, Introduction to Security (Chap 1)

2 Review of operating systems, networks, and TCP/IP

3 Hackers, crackers, and lots of other definitions (Chap 2)

4 Information Gathering (Chap 3/Chap 4)

5 Business Careers Week Seminars

6 Information and Cyber Warfare

7 Hiding information: Cryptography and Steganography (Chap 5/6))

8 Scanning and Spoofing (Chap 15, pgs 401-403)

9 Introduction to UNIX (Supplemental)

10 Script & Perl Programming

11 **** Exam 1 ****

12 Sniffing and Session Hijacking (Chap 15)

13 More Perl Programming

14 Denial of Service and Distributed DoS (Chap 15)

15 Buffer Overflows (Chap 18)

16 Passwords, authentication, and access control (Chap 8)

17 Password Cracking (Chap 14)

18 Malicious Software(Chap 15, pgs 409-417)

19 Firewalls (Chap 10)

20 Logging and Intrusion Detection Systems (Chap 13)

21 **** Exam 2 ****

22 Wardialing and Modem Security

23 NT and Windows Security (Chap 14)

24 UNIX/Linux Security (Chap 14)

25 Policies, standards, procedures, and Cyber Law (Chap 24)

26 Contingency Planning, Disaster Recovery, Security Assessments (Chap 19)

27 Building secure apps/systems, security models, Web security (Chap 17,18, 22)

28 Security Criteria, Certifications, and Training

29 Cyber Crime, Computer Forensics, and Incident Response (Chap 23)

30 Voice and Wireless Security, Future Security Issues
FINAL per University Schedule


The Roadrunner Creed


The University of Texas at San Antonio is a community of scholars, where integrity, excellence, inclusiveness, respect, collaboration, and innovation are fostered.



As a Roadrunner,
I will:
Uphold the highest standards of academic and personal integrity by practicing and expecting fair and ethical conduct;
Respect and accept individual differences, recognizing the inherent dignity of each person;
Contribute to campus life and the larger community through my active engagement; and
Support the fearless exploration of dreams and ideas in the advancement of ingenuity, creativity, and discovery.
Guided by these principles now and forever, I am a Roadrunner!

The University of Texas at San Antonio Academic Honor Code

A. Preamble


The University of Texas at San Antonio community of past, present and future students, faculty, staff, and administrators share a commitment to integrity and the ethical pursuit of knowledge. We honor the traditions of our university by conducting ourselves with a steadfast duty to honor, courage, and virtue in all matters both public and private. By choosing integrity and responsibility, we promote personal growth, success, and lifelong learning for the advancement of ourselves, our university, and our community.

B. Honor Pledge


In support of the ideals of integrity, the students of the University of Texas at San Antonio pledge:
“As a UTSA Roadrunner I live with honor and integrity.”

C. Shared responsibility


The University of Texas at San Antonio community shares the responsibility and commitment to integrity and the ethical pursuit of knowledge and adheres to the UTSA Honor Code.


The database is protected by copyright ©ininet.org 2016
send message

    Main page