Course Description:
As the world continues to evolve and become more immersed in a virtual culture, the nature of information and properties of data have radically changed, forcing society to reexamine the means by which these assets are protected. Over thousands of years of practice, concepts behind information assurance, integrity and secrecy in the physical world became such that given certain variables, there could be a high level of trust in data. However, these models are no longer valid as nearly all information now travels on relatively insecure electronic mediums, with very little understanding of security principles for these domains. In order to continue to grow commercially, protect individual privacy and insure national security, it is essential that achievable levels of information security be implemented and strategies formed that mitigate the risk of the full spectrum of threats.
The course will provide a broad overview of the concepts, fundamental ideas, vocabulary and literature base central to the study and development of secure information systems. It will introduce: 1) the notion of threat to an information system, technical and procedural approaches to mitigating the threat; 2) the technical concepts of secure system design and development; and 3) mechanisms for building security services and risk management. The purpose of this course is to provide students with a comprehensive overview of the subject area and to prepare students for the more advanced study in information assurance.
It is recommended that students have some background in computer security, or a strong willingness to learn. Recommended previous courses of study include computer science, electrical engineering, computer engineering, management information systems, and/or mathematics. Because this is a foundational course, it is of a reasonable technical difficulty that it may be considered for student in non-technical program that have good technical acumen in degree programs such as business.
This class will be primarily individual study, with weekly assigned readings, eight homework assignments, four quizzes, one project, a midterm and a final. Students are also required to perform literature research for each class period.
Objectives:
This course has twelve primary learning objectives for students. Each objective should be considered a section of the course, and will have corresponding readings, homework, and/or quizzes. Success in this course will largely depend on mastery of these objectives:
1. Identify Threats to the Security of Information Systems
2. Identify methods of handling security threats
3. Identify elements of Program Security
4. Identify elements involved in the Protection in General Purpose Operating Systems
5. Discuss and describe elements in the Design of Trusted Operating Systems
6. Discuss and describe the Application Security as illustrated with Data Base Management Systems
7. Articulate the Basis Encryption and Decryption
8. Identify the elements of Secure Encryption Systems
9. Identify the Uses of Encryption in Protocols and issues of Key Management
10. Discuss and describe the Security in Networks and Distributed Systems
11. Discuss and describe the Secure System Administration
12. Identify the Legal and Ethical Issues in Information Assurance