DEL MAR COLLEGE CIS DEPARTMENT I. ITSY 1300 Intro to Information Security (2-4-3) 11.1003 Basic information security goals of availability, integrity, accuracy, and confidentiality. Vocabulary and terminology specific to the field of information security are discussed. Identification of exposures and vulnerabilities and appropriate countermeasures are addressed. The importance of appropriate planning and administrative controls is also discussed. Course IDEA Objectives: Essential: Gaining factual knowledge (terminology, classifications, methods, trends) Important: Learning to apply course material (to improve thinking, problem solving, and decision. Essential: Developing specific skills, competencies, and points of view needed by professionals in the field most closely related to this course. SCANS (Secretary’s Commission on Achieving Necessary Skills) competencies are integrated into this course curriculum to improve education by helping to better define and assess the proficiency skills needed for employment. Each course competency will implement several SCANS to help you develop and reinforce employable skills. Competencies are criterion referenced (ie. They are measured against predetermined levels of proficiency in skills for effective job performance). The know-how identified by SCANS is made up of five competencies and a three-part foundation of skills and personal qualities that are needed for solid job performance. These are: WORKPLACE COMPETENCIES -- Effective workers can productively use: Resources -- They know how to (C1) allocate time, (C2) money, ( C3) materials, and (C4) staff Information --They can (C5) acquire and evaluate data, (C6) organize, and maintain files, (C7) interpret and communicate, and (C8) use computers to process information. Interpersonal Skills -- They can work on (C9) teams, (C10) teach others, (C11) serve customers, (C12) lead, (C13) negotiate, and (C14) work well with people from culturally diverse backgrounds. Systems -- They (C15) understand social, organizational, and technological systems; (C16) they can monitor and correct performance; and (17) they can design or improve systems. Technology -- They can (C18) select equipment and tools, (C19) apply technology to specific tasks, and (C20) maintain and troubleshoot equipment. Note: The subset C18, C19, and C20 are very important skills; however, these are not addressed in this course. These skills will be covered in further, technical courses FOUNDATION SKILLS -- Competent workers in the high-performance workplace need: Basic Skills-- (F1) reading, (F2) writing, (F3) arithmetic and (F4) mathematics, (F5) listening and (F6) speaking. Thinking Skills-- (F7) to think creatively, (F8) to make decisions, (F9) to solve problems, (F10) to visualize, (F11) the ability to learn, and (F12) to reason. Personal Qualities --(F13) individual responsibility, (F14) self-esteem, (F15) sociability, (F16) self-management, and (F17) integrity. ITSY 1300 Intro to Information Security (2-4-3) 11.1003 Page 1 of 5 II. ITSY 1300 LEARNING OUTCOME--JOB SKILL: A. The Foundational Material will cover the history, definition, and mission of computer security from a high level. B. The Specific Threats and Vulnerabilities section will perform a survey of common threats to information and information systems. C. The course will include a Survey of the Common Defensive Countermeasures wherein the students will participate in a high-level discussion of the defensive countermeasures currently in accepted best practice industrial use. D. The Intrusion Detection component will introduce the students to the concepts of logging, monitoring, and controlling applications. E. The Human Element of Security will introduce security policies, their implementation, and their acceptance by the people working under the policy. F. In the Remediation and Recovery block, the student will be exposed to industry best practices with respect to data back-up and archival, disaster recovery, business continuity planning, and insurance documentation. G. The Security Management block will explore management’s responsibilities as it applies to security policies, liability management, risk assessment, risk management. H. The class will discuss The Security and Privacy Requirements of Medical Records as mandated by The Health Insurance Portability and Accountability Act of 1996 (HIPAA). I. This course will emphasize a significant Ethical Foundation throughout the above topics stressing the moral basis of intellectual property, personal privacy, and an individual's responsibility for his or her actions particularly with respect to information. To facilitate mastery of the above-listed competencies, the instructor will be responsible for: 1) 2) 3) 4) 5) 6) 7) 8) 9) gaining student's attention informing student of objectives stimulating recall of prior knowledge presenting new material providing guided practice eliciting performance providing feedback assessing performance enhancing retention and transfer of knowledge. ITSY 1300 Intro to Information Security (2-4-3) 11.1003 Page 2 of 5 Evaluation: To demonstrate mastery of the competencies listed above, the student will be responsible for: 1) 2) 3) Completing class assignments using instructional material and lecture notes. Completing lab based Skills Bases Assessments. Attending class and participating in the discussions. III. ITSY 1300 LEARNING OUTCOME--subcategories of Major Themes: COMPETENCY-BASED OUTCOMES WITH WORKPLACE PROFICIENCY LEVELS for ITSY 1300 Resources Information A B C D E F G H I C1 2 2 2 2 2 2 2 2 5 C2 C3 C4 C5 C6 3 2 5 4 3 3 3 5 4 4 4 1 4 2 4 5 4 2 4 5 5 5 5 5 Interpersonal Skills Systems Technology C7 C8 C9 C10 C11 C12 C13 C14 C15 C16 C17 C18 C19 C20 5 5 5 1 2 5 5 5 5 5 5 5 1 2 5 5 5 5 5 5 5 1 2 5 5 5 5 5 5 5 1 2 5 5 5 5 5 5 5 1 2 5 5 5 5 5 5 5 1 2 5 5 5 5 5 5 5 1 2 5 5 5 5 5 5 5 1 2 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 COMPETENCY-BASED OUTCOMES WITH FOUNDATIONAL LEVELS for ITSY 1300 A B C D E F G H I F1 5 5 5 5 5 5 5 5 5 Basic Skills F2 F3 F4 F5 5 4 5 4 5 4 5 4 5 4 5 4 5 4 5 4 5 4 Thinking Skills F6 F7 F8 F9 F10 F11 4 4 4 3 4 4 4 3 3 4 4 3 3 4 4 3 4 4 4 3 3 4 4 3 4 4 4 3 4 4 4 3 4 4 F12 4 4 4 4 4 4 4 4 4 Personal Qualities F13 F14 F15 F16 F17 5 3 5 5 5 3 5 5 5 3 5 5 5 3 5 5 5 3 5 5 5 3 5 5 5 3 5 5 5 3 5 5 5 3 5 5 PROFICIENCY LEVELS FOR SCANS COMPETENCIES: 1) Rarely performs task 2) Routinely performs task with moderate supervision 3) Routinely performs task with minimal supervision 4) Routinely performs task 5) Routinely performs task over and beyond designated task ITSY 1300 Intro to Information Security (2-4-3) 11.1003 Page 3 of 5 III. Course Information: Instructor: Office: VB 114 Phone: (361)698-1299 Prof. Michael P. Harris, CCNA, CCAI Computer Science Dept. Email: mpharris@delmar.edu The objective of this course is to develop in the student specific communications skills, competencies, and ethical points of view needed by professionals in the Information Security field. The course is intended to set the foundation for further study through reading, research, writing, and presenting security related topics. This course will emphasize breadth over depth in the subject matter. While some programming skills will be helpful to understanding the concepts, this course does not include a technical programming component or prerequisite. Textbook: Computer Security Fundamentals, Pearson/Prentice Hall, 2006 - Chuck Easttom Class Structure: There will be a lecture/discussion portion and a presentation segment. I do not intend to read the textbook to you; therefore, please come to class having accomplished the assigned reading. We will begin each class with the Lecture/discussion for the days topic and this will usually be followed by a formal presentation/demonstration. The remainder of the class will be an open lab wherein I will be available to help with your labs, skills-based assessments, and research projects. Examination & Grading Policy: Unit Exams (2-3) Homework Assignments (10-12) Final Exam Skills Bases Assessment ( Labs | Lab Exam ) Materials: (1) (2) (1) (2) 60% 10% 20% 10% USB Flash Drive (64MB or larger) (for local removable storage for labs) CD-R -or- CD-RW (writeable or rewriteable blank CDROMs) w/cases Notebook to organize & maintain handouts, notes, exams, and lab work. Pens, Pencils, Paper, Highlighters, Term Paper presentation folders, Pocket folders for assignments, and other nominal supplies as can be expected for completion of a college course. Maintaining email communication and assignment submission via email will be a major graded component of class attendance. Class attendance is mandatory. Absences totaling two class weeks is considered excessive and is grounds for being dropped from the course. No make-up tests will be given except in emergency situations. Students requesting disability accommodations or information are encouraged to contact the office of Special Services, located in the Harvin Center, 698-1298. ITSY 1300 Intro to Information Security (2-4-3) 11.1003 Page 4 of 5 NOTE: If you have any questions about the content or grading of this course please ask them in class or during my office hours. Also note that the content, schedule, administration, and/or management of this course is subject to change without notice. The instructor reserves the right to modify this syllabus at any time. Additionally, all material discussed or shown in this course are for educational purposes only, and as such will only be used within the classroom for class related projects. Course Outline: Week 01 Week 02 Week 03 Week 04 Week 05 Week 06 Week 07 Week 08 Week 09 Week 10 Week 11 Week 12 Week 13 Week 14 Week 15 Week 16 Introduction Chapter 1. Introduction to Cyber Crime and Security Chapter 2. Networks and the Internet Chapter 3. Assessing a Target System Chapter 4. Denial of Service Attacks Unit Exam #1 -Chapters 1-4 Chapter 5. Malware Chapter 6. Basics of Assessing and Securing a System Chapter 7. Encryption Chapter 8. Internet Fraud, and Cyber Crime Unit Exam #2 -Chapters 5-8 Chapter 9. Industrial Espionage Chapter 10. Cyber Terrorism and Information Warfare Chapter 11. Cyber Detective Chapter 12. Security Hardware and Software Final Exam –Chapters 9-12 Del Mar College online Student Resources and Student Information hyperlinks: Student Rights, Responsibilities & Safety | Standards of Conduct | Scholastic Dishonesty Catalog & Student Handbook | Fall 2005 Semester Calendar | free Peer-Tutoring | Library Student Advising Handbook | Safety & Security | Computer/Network Use Policy | CS/IT ITSY 1300 Intro to Information Security (2-4-3) 11.1003 Page 5 of 5