A. ISA 650 Security Policy - Office of the Provost

advertisement
George Mason University – Graduate Council
Graduate Course Approval Form
All courses numbered 500 or above must be submitted to the Graduate Council for final approval after approval by the
sponsoring College, School or Institute.
Graduate Council requires submission of this form for a new course or any change to existing courses. For a new course,
please attach a copy of the syllabus and catalog description (with catalog credit format, e.g. 3:2:1). The designated
representative of the College, School or Institute should forward the form along with the syllabus and catalog description, if
required, as an email attachment (in one file) to the secretary of the Graduate Council. A printed copy of the form with
signatures and the attachments should be brought to the Graduate Council meeting. Please complete the Graduate Course
764Coordinator Form if the proposed changes will affect other units.
Note: Colleges, Schools or Institutes are responsible for submitting new or modified catalog descriptions (35 words or
less, using catalog format) to Creative Services by deadlines outlined in the yearly Catalog production calendar.
Please indicate: New____X___
Modify_______
Delete_______
Department/Unit:_______ISE_____________ Course Subject/Number:_______ISA 650_________________
Submitted by:____Edgar H Sibley___________________ Ext:___31669___ Email:_____esibley@gmu.edu_____
Course Title:______ Security Policy ____________________________________________
Effective Term (New/Modified Courses only): __Spring, 2008____ Final Term (deleted courses only):____________
Credit Hours: (Fixed) __3__
(Var.) _____ to ______
Grade Type (check one):
__X__
_____
_____
Regular graduate (A, B, C, etc.)
Satisfactory/No Credit only
Special graduate (A, B, C, etc. + IP)
Repeat Status*(check one): _X_ NR-Not repeatable ____ RD-Repeatable within degree ____ RT-Repeatable within term
*Note: Used only for special topics, independent study, or internships courses
Total Number of Hours Allowed: _______
Schedule Type Code(s): 1._LEC_ LEC=Lecture SEM=Seminar STU=Studio INT=Internship IND=Independent Study
2.____ LAB=Lab RCT=Recitation (second code used only for courses with Lab or Rct component)
Prereq _X_ Coreq ___ (Check one):___ ISA 562 or permission of instructor _________________________
__________________________________________________________________________________________
Note: Modified courses - review prereq or coreq for necessary changes; Deleted courses - review other courses to correct prereqs that list the deleted course.
Description of Modification (for modified courses):____________________________________________________________________
Special Instructions (major/college/class code restrictions, if needed):__________________________________________
Department/Unit Approval Signature:_________________________________________ Date: _____________
College/School Committee Approval Signature:__________________________________ Date:_____________
Graduate Council Approval Date:____________ Provost Office Signature:_________________________________
George Mason University
Graduate Course Coordination Form
Approval from other units:
Please list those units outside of your own who may be affected by this new, modified, or deleted course. Each of these units must
approve this change prior to its being submitted to the Graduate Council for approval.
Unit:
Head of Unit’s Signature:
Date:
Unit:
Head of Unit’s Signature:
Date:
Unit:
Head of Unit’s Signature:
Date:
Unit:
Head of Unit’s Signature:
Date:
Unit:
Head of Units Signature:
Date:
Graduate Council approval: ______________________________________________ Date: ____________
Graduate Council representative: __________________________________________
Date: ____________
Provost Office representative: ____________________________________________
Date: ____________
COURSE PROPOSAL
BY
THE DEPARTMENT OF COMPUTER SCIENCE
PROPOSAL DESIGNATION
New Course Proposal
I. CATALOG DESCRIPTION
A. ISA 650 Security Policy (3:3:0)
B. Prerequisite: ISA 562
The course focuses on security policy and its management for information systems having national and international
connectivity. Issues include legal, international, cultural, and local factors. Students are expected to participate
regularly in presenting material, in discussion of recent security issues, and by writing short papers on major current
issues.
II. JUSTIFICATION
A. Desirability of adding this course:
This course is proposed as part of a change in the MS ISA program and is of interest to and accessible to
students in a variety of specializations that wish to learn policy aspects of secure systems..
B. Relation to other courses:
This course requires material taught in the two basic security courses of the ISA curriculum. It also provides a
basis for mathematical aspects of policy verification discussed in ISA 763.
III. APPROVAL HISTORY
A. Approved by the ISA group _____________
B. Approved by the ISE Department ____________________
C. Approved by the IT&E Graduate Studies Committee on __________
D. Approved by the IT&E Dean on __________
IV. SCHEDULING
A. This course has already been offered (with modifications) as a special topics course three times and
should be offered in the Spring semester 2008 and every academic year thereafter in the Spring semester.
B. The instructor has been and will continue to be Dr. E H Sibley.
V. SAMPLE SYLLABUS
Objectives
To examine the laws, regulations and policies affecting cyber and national security and their interrelationships. These, in turn, require
companies and governmental offices to implement procedures that result in effective security management both nationally and
internationally.
Some typical Material for Downloading from the web
Digital Millennium Copyright Act
http://www.copyright.gov/legislation/dmca.pdf
HIPAA
http://aspe.hhs.gov/admnsimp/pl104191.htm
Computer Security: A Summary of Selected Federal Laws, Executive Orders, and Presidential Directives
http://www.fas.org/irp/crs/RL32357.pdf
E-Government Act of 2002 (contains FISMA)
http://csrc.nist.gov/policies/HR2458-final.pdf
NSD 42
http://www.cnss.gov/Assets/pdf/CNSSD-502.pdf
US Patriot Act
http://www.epic.org/privacy/terrorism/hr3162.html
Homeland Security Act
http://www.dhs.gov/interweb/assetlibrary/hr_5005_enr.pdf
DoD Directive 8500
http://www.dtic.mil/whs/directives/corres/pdf/d85001_102402/d85001p.pdf
The National Strategy to Secure Cyberspace:
http://www.whitehouse.gov/pcipb/
Common Criteria
http://www.commoncriteriaportal.org/
The IAVA process
http://www.cnss.gov/Assets/pdf/cnssi_4013.pdf
Outline
Introduction: General Policy, Security Policy, and the law
What is Policy? How does it intersect with the Law? How about Treaties?
The Structure of Countries and the Legislative Process
The US and EU as examples and their structural relationships
Non-Security Acts affecting Computer Systems (1)
Copyright, patent, trademark, trade secrets, contracting aspects of IS, & international Web issues
Non-Security Acts affecting Computer Systems (2)
Monopoly Issues and Recent Computing Laws for non-Government Organizations, DoJ and the Computing Industry, Sarbanes Oxley,
HIPAA, etc.
Introduction to Security Laws
Critical Infrastructure protection and SCADA Systems
The Patriot Act and The Homeland Security Act
Problems and inter-relationships. The role of States and major cities
Common Criteria and International Standards
Security Management Policy
The changing Role of the FTC as a policy watchdog in the US, The DoD IAVA process, the role of the OMB in Privacy/Security
Management
Directives 8500 and 8100.2
National and State Infrastructure Aspects
Examples: DC and the DHS, NY State and NY City, and the State of Virginia interaction
The GIG (Global Information Grid) and Security Issues
Cyber Warfare and the UN
The UN Charter and international laws on warfare, etc.
Catalog Description (35 words or less) please use catalog format and attach a copy of the syllabus for new courses:
ISA 650 Security Policy (3:3:0). Prerequisite: ISA 562, or permission of instructor.
The course focuses on security policy and its management for information systems having national and international
connectivity. Issues include legal, international, cultural, and local factors. Students are expected to participate
regularly in presenting material, in discussion of recent security issues, and by writing short papers on major current
issues.
Download