|Information Assurance and Security
MW 6:00-7:15 PM, MH 2.02.16
Bachelor of Business Administration: Students will be able to
Use quantitative analysis and quantitative and non-quantitative reasoning to effectively identify and solve business problems.
Communicate, both orally and in writing, information and ideas pertinent to business decision-making.
Use current information technology to support business decision-making.
Identify ethical and legal issues in a business context and find alternatives that demonstrate ethical values.
Incorporate a global perspective in business decisions
A topic of increasing importance and interest in the world of information systems and technology is security. For a variety of reasons, it is imperative that the information organizations store in their computer systems and networks be protected from unauthorized disclosure, modification, or destruction. This course will provide the student the opportunity to learn about the basic elements that comprise Information Assurance Security.
COURSE OBJECTIVES SUPPORTING B.B.A. PROGRAM GOALS:
Complete four labs that show proficiency in using security related applications
Complete a paper that demonstrate the students ability to synthesize security and business related issues
Successfully complete two exams that show the students understand the basics of information assurance
It is assumed that students in this class have a basic understanding of Operating Systems and Networks and that they have access to the Internet and a UNIX- or Windows- based PC.
The required textbook that will be used for this class is: Principles of Computer Security, Conklin, White, Cothren, Williams, and Davis, McGraw Hill, 2016. ISBN-13: 978-0071835978 ISBN-10: 0071835970.
The grades for this course will be based on a standard 70% = C, 80% = B, 90%=A grading scheme. The final grades will be based on the following assignments:
Paper 1 100 points
4 Labs 400 points
Exams 250 points
Final Exam 250 points
TOTAL 1000 points
The instructor for the course will be Professor Robert J. Kaufman email@example.com Office hours are MW 5:150 – 5:45 pm or by appointment.
Attendance will not be taken in class. A student missing class is responsible for obtaining information missed. Any late penalties for assignments will be outlined in the individual assignment handout. Please ensure pagers and cell phones are turned off during class – exceptions for unusual circumstances should be arranged in advance with the instructor. Any other special considerations for assignments or examinations should be cleared in advance with the instructor.
1 Course Introduction, Introduction to Security (Chap 1)
2 Review of operating systems, networks, and TCP/IP
3 Hackers, crackers, and lots of other definitions (Chap 2)
4 Information Gathering (Chap 3/Chap 4)
5 Business Careers Week Seminars
6 Information and Cyber Warfare
7 Hiding information: Cryptography and Steganography (Chap 5/6))
8 Scanning and Spoofing (Chap 15, pgs 401-403)
9 Introduction to UNIX (Supplemental)
10 Script & Perl Programming
11 **** Exam 1 ****
12 Sniffing and Session Hijacking (Chap 15)
13 More Perl Programming
14 Denial of Service and Distributed DoS (Chap 15)
15 Buffer Overflows (Chap 18)
16 Passwords, authentication, and access control (Chap 8)
17 Password Cracking (Chap 14)
18 Malicious Software(Chap 15, pgs 409-417)
19 Firewalls (Chap 10)
20 Logging and Intrusion Detection Systems (Chap 13)
21 **** Exam 2 ****
22 Wardialing and Modem Security
23 NT and Windows Security (Chap 14)
24 UNIX/Linux Security (Chap 14)
25 Policies, standards, procedures, and Cyber Law (Chap 24)
26 Contingency Planning, Disaster Recovery, Security Assessments (Chap 19)
27 Building secure apps/systems, security models, Web security (Chap 17,18, 22)
28 Security Criteria, Certifications, and Training
29 Cyber Crime, Computer Forensics, and Incident Response (Chap 23)
30 Voice and Wireless Security, Future Security Issues
FINAL per University Schedule
The Roadrunner Creed
The University of Texas at San Antonio is a community of scholars, where integrity, excellence, inclusiveness, respect, collaboration, and innovation are fostered.
As a Roadrunner,
Uphold the highest standards of academic and personal integrity by practicing and expecting fair and ethical conduct;
Respect and accept individual differences, recognizing the inherent dignity of each person;
Contribute to campus life and the larger community through my active engagement; and
Support the fearless exploration of dreams and ideas in the advancement of ingenuity, creativity, and discovery.
Guided by these principles now and forever, I am a Roadrunner!
The University of Texas at San Antonio Academic Honor Code
The University of Texas at San Antonio community of past, present and future students, faculty, staff, and administrators share a commitment to integrity and the ethical pursuit of knowledge. We honor the traditions of our university by conducting ourselves with a steadfast duty to honor, courage, and virtue in all matters both public and private. By choosing integrity and responsibility, we promote personal growth, success, and lifelong learning for the advancement of ourselves, our university, and our community.
B. Honor Pledge
In support of the ideals of integrity, the students of the University of Texas at San Antonio pledge:
“As a UTSA Roadrunner I live with honor and integrity.”
The University of Texas at San Antonio community shares the responsibility and commitment to integrity and the ethical pursuit of knowledge and adheres to the UTSA Honor Code.