I. ITSY 1300 Intro to Information Security (2-4-3) 11.1003

advertisement
DEL MAR COLLEGE
CIS DEPARTMENT
I. ITSY 1300 Intro to Information Security (2-4-3)
11.1003
Basic information security goals of availability, integrity, accuracy, and confidentiality.
Vocabulary and terminology specific to the field of information security are discussed.
Identification of exposures and vulnerabilities and appropriate countermeasures are addressed.
The importance of appropriate planning and administrative controls is also discussed.
Course IDEA Objectives:
Essential:
Gaining factual knowledge (terminology, classifications, methods, trends)
Important:
Learning to apply course material (to improve thinking, problem solving, and decision.
Essential:
Developing specific skills, competencies, and points of view needed by professionals in
the field most closely related to this course.
SCANS (Secretary’s Commission on Achieving Necessary Skills) competencies are integrated into this
course curriculum to improve education by helping to better define and assess the proficiency skills needed
for employment. Each course competency will implement several SCANS to help you develop and
reinforce employable skills. Competencies are criterion referenced (ie. They are measured against
predetermined levels of proficiency in skills for effective job performance).
The know-how identified by SCANS is made up of five competencies and a three-part foundation of skills
and personal qualities that are needed for solid job performance. These are:
WORKPLACE COMPETENCIES -- Effective workers can productively use:
Resources -- They know how to (C1) allocate time, (C2) money, ( C3) materials, and (C4) staff
Information --They can (C5) acquire and evaluate data, (C6) organize, and maintain files, (C7) interpret
and communicate, and (C8) use computers to process information.
Interpersonal Skills -- They can work on (C9) teams, (C10) teach others, (C11) serve customers, (C12)
lead, (C13) negotiate, and (C14) work well with people from culturally diverse backgrounds.
Systems -- They (C15) understand social, organizational, and technological systems; (C16) they can
monitor and correct performance; and (17) they can design or improve systems.
Technology -- They can (C18) select equipment and tools, (C19) apply technology to specific tasks, and
(C20) maintain and troubleshoot equipment.
Note: The subset C18, C19, and C20 are very important skills; however, these are not addressed in this
course. These skills will be covered in further, technical courses
FOUNDATION SKILLS -- Competent workers in the high-performance workplace need:
Basic Skills-- (F1) reading, (F2) writing, (F3) arithmetic and (F4) mathematics, (F5) listening and (F6)
speaking.
Thinking Skills-- (F7) to think creatively, (F8) to make decisions, (F9) to solve problems,
(F10) to visualize, (F11) the ability to learn, and (F12) to reason.
Personal Qualities --(F13) individual responsibility, (F14) self-esteem, (F15) sociability,
(F16) self-management, and (F17) integrity.
ITSY 1300 Intro to Information Security (2-4-3) 11.1003
Page 1 of 5
II. ITSY 1300 LEARNING OUTCOME--JOB SKILL:
A. The Foundational Material will cover the history, definition, and mission of computer
security from a high level.
B. The Specific Threats and Vulnerabilities section will perform a survey of common threats to
information and information systems.
C. The course will include a Survey of the Common Defensive Countermeasures wherein the
students will participate in a high-level discussion of the defensive countermeasures currently
in accepted best practice industrial use.
D. The Intrusion Detection component will introduce the students to the concepts of logging,
monitoring, and controlling applications.
E. The Human Element of Security will introduce security policies, their implementation, and
their acceptance by the people working under the policy.
F. In the Remediation and Recovery block, the student will be exposed to industry best practices
with respect to data back-up and archival, disaster recovery, business continuity planning, and
insurance documentation.
G. The Security Management block will explore management’s responsibilities as it applies to
security policies, liability management, risk assessment, risk management.
H. The class will discuss The Security and Privacy Requirements of Medical Records as
mandated by The Health Insurance Portability and Accountability Act of 1996 (HIPAA).
I. This course will emphasize a significant Ethical Foundation throughout the above topics
stressing the moral basis of intellectual property, personal privacy, and an individual's
responsibility for his or her actions particularly with respect to information.
To facilitate mastery of the above-listed competencies, the instructor will be responsible for:
1)
2)
3)
4)
5)
6)
7)
8)
9)
gaining student's attention
informing student of objectives
stimulating recall of prior knowledge
presenting new material
providing guided practice
eliciting performance
providing feedback
assessing performance
enhancing retention and transfer of knowledge.
ITSY 1300 Intro to Information Security (2-4-3) 11.1003
Page 2 of 5
Evaluation:
To demonstrate mastery of the competencies listed above, the student will be responsible for:
1)
2)
3)
Completing class assignments using instructional material and lecture notes.
Completing lab based Skills Bases Assessments.
Attending class and participating in the discussions.
III. ITSY 1300 LEARNING OUTCOME--subcategories of Major Themes:
COMPETENCY-BASED OUTCOMES WITH WORKPLACE PROFICIENCY LEVELS for ITSY 1300
Resources Information
A
B
C
D
E
F
G
H
I
C1
2
2
2
2
2
2
2
2
5
C2 C3 C4 C5 C6
3
2
5 4
3 3 3 5 4
4
4
1
4
2
4
5
4
2
4
5 5 5 5 5
Interpersonal Skills
Systems
Technology
C7 C8 C9 C10 C11 C12 C13 C14 C15 C16 C17 C18 C19 C20
5
5 5
1
2
5
5
5
5
5
5 5
1
2
5
5
5
5
5
5 5
1
2
5
5
5
5
5
5 5
1
2
5
5
5
5
5
5 5
1
2
5
5
5
5
5
5 5
1
2
5
5
5
5
5
5 5
1
2
5
5
5
5
5
5 5
1
2
5
5
5
5
5 5 5 5
5
5
5
5
5
5
5
COMPETENCY-BASED OUTCOMES WITH FOUNDATIONAL LEVELS for ITSY 1300
A
B
C
D
E
F
G
H
I
F1
5
5
5
5
5
5
5
5
5
Basic Skills
F2 F3 F4 F5
5
4
5
4
5
4
5
4
5
4
5
4
5
4
5
4
5
4
Thinking Skills
F6 F7 F8 F9 F10 F11
4
4
4
3 4
4
4
3 3
4
4
3 3
4
4
3 4
4
4
3 3
4
4
3 4
4
4
3 4
4
4
3 4
4
F12
4
4
4
4
4
4
4
4
4
Personal Qualities
F13 F14 F15 F16 F17
5
3
5
5
5
3
5
5
5
3
5
5
5
3
5
5
5
3
5
5
5
3
5
5
5
3
5
5
5
3
5
5
5
3
5
5
PROFICIENCY LEVELS FOR SCANS COMPETENCIES:
1)
Rarely performs task
2)
Routinely performs task with moderate supervision
3)
Routinely performs task with minimal supervision
4)
Routinely performs task
5)
Routinely performs task over and beyond designated task
ITSY 1300 Intro to Information Security (2-4-3) 11.1003
Page 3 of 5
III. Course Information:
Instructor:
Office: VB 114
Phone: (361)698-1299
Prof. Michael P. Harris, CCNA, CCAI
Computer Science Dept.
Email: mpharris@delmar.edu
The objective of this course is to develop in the student specific communications skills,
competencies, and ethical points of view needed by professionals in the Information Security
field. The course is intended to set the foundation for further study through reading, research,
writing, and presenting security related topics. This course will emphasize breadth over depth in
the subject matter. While some programming skills will be helpful to understanding the
concepts, this course does not include a technical programming component or prerequisite.
Textbook: Computer Security Fundamentals,
Pearson/Prentice Hall, 2006 - Chuck Easttom
Class Structure: There will be a lecture/discussion portion and a presentation segment. I do not
intend to read the textbook to you; therefore, please come to class having accomplished the
assigned reading. We will begin each class with the Lecture/discussion for the days topic and this
will usually be followed by a formal presentation/demonstration. The remainder of the class will
be an open lab wherein I will be available to help with your labs, skills-based assessments, and
research projects.
Examination & Grading Policy:
Unit Exams (2-3)
Homework Assignments (10-12)
Final Exam
Skills Bases Assessment ( Labs | Lab Exam )
Materials:
(1)
(2)
(1)
(2)
60%
10%
20%
10%
USB Flash Drive (64MB or larger) (for local removable storage for labs)
CD-R -or- CD-RW (writeable or rewriteable blank CDROMs) w/cases
Notebook to organize & maintain handouts, notes, exams, and lab work.
Pens, Pencils, Paper, Highlighters, Term Paper presentation folders, Pocket
folders for assignments, and other nominal supplies as can be expected for
completion of a college course.
Maintaining email communication and assignment submission via email will be a major graded
component of class attendance. Class attendance is mandatory. Absences totaling two class
weeks is considered excessive and is grounds for being dropped from the course. No make-up
tests will be given except in emergency situations. Students requesting disability accommodations
or information are encouraged to contact the office of Special Services, located in the Harvin
Center, 698-1298.
ITSY 1300 Intro to Information Security (2-4-3) 11.1003
Page 4 of 5
NOTE: If you have any questions about the content or grading of this course please ask them in
class or during my office hours. Also note that the content, schedule, administration, and/or
management of this course is subject to change without notice. The instructor reserves the right
to modify this syllabus at any time. Additionally, all material discussed or shown in this course
are for educational purposes only, and as such will only be used within the classroom for class
related projects.
Course Outline:
Week 01
Week 02
Week 03
Week 04
Week 05
Week 06
Week 07
Week 08
Week 09
Week 10
Week 11
Week 12
Week 13
Week 14
Week 15
Week 16
Introduction
Chapter 1. Introduction to Cyber Crime and Security
Chapter 2. Networks and the Internet
Chapter 3. Assessing a Target System
Chapter 4. Denial of Service Attacks
Unit Exam #1 -Chapters 1-4
Chapter 5. Malware
Chapter 6. Basics of Assessing and Securing a System
Chapter 7. Encryption
Chapter 8. Internet Fraud, and Cyber Crime
Unit Exam #2 -Chapters 5-8
Chapter 9. Industrial Espionage
Chapter 10. Cyber Terrorism and Information Warfare
Chapter 11. Cyber Detective
Chapter 12. Security Hardware and Software
Final Exam –Chapters 9-12
Del Mar College online Student Resources and Student Information hyperlinks:
Student Rights, Responsibilities & Safety | Standards of Conduct | Scholastic Dishonesty
Catalog & Student Handbook | Fall 2005 Semester Calendar | free Peer-Tutoring | Library
Student Advising Handbook | Safety & Security | Computer/Network Use Policy | CS/IT
ITSY 1300 Intro to Information Security (2-4-3) 11.1003
Page 5 of 5
Download