MASTER SYLLABUS TECM 747: Information Assurance and Security Management 2 credit hour Prerequisites: Qualifying Requirements: Admission to M.S. Technology Management (MSTM) program Prerequisite Courses: None Programs: M.S. Technology Management Course Description: The course broadly addresses the increasingly important area of information security and information assurance. The coverage will stress on the need for and design of security controls in the current business environment which is characterized by highly networked and flexible organization structures. Specific focus will be on best practices for assessment, planning and management of information security controls to minimize the risks pertaining to unauthorized use, processing, storage, and communication of digital information. The course will also introduce the students to pertinent legislations and policy requirements. Learning Objectives: The overall objective is to develop an understanding of the CIO's information security roles and responsibilities. Specific learning objectives include: 1. 2. 3. 4. 5. Information systems threats and vulnerabilities IT and Physical Security Information privacy Information security legislation, policies, and compliance Enterprise architecture security framework and application.Information security governance. CIO Core Competencies and Learning Objectives 10.0 Information Security/Information Assurance (IA) 10.1 CIO information security roles and responsibilities 10.2 Information security/related legislation, policies and procedures 10.3 Privacy and personally identifiable information 10.4 Information and information systems threats and vulnerabilities 10.5 Information security controls planning and management 10.8 Information security reporting compliance Assurance of Learning: Approach to Learning: This course is geared for the student who intends to be a technology management professional engaged in business, government, or the non-profit sector. The delivery will be in form of class-lectures and discussions. Discussions on the subject matter will be motivated through case studies, and guest speakers. Class participation, and critical analysis will be will be particularly emphasized. Core Course Topics: 1. 2. 3. 4. 5. 6. What is information security? Identification, authentication and access control Operations Security, Physical Security and Network Security Data and Information Privacy Development of Security Policies Information Security Governance Representative Text and Learning Materials: 1. 2. Information Security: Contemporary Cases, by Marie A. Wright, John S. Kakalik; Publisher Jones & Bartlett Information Security Governance, Krag Brotby; Publisher Wiley Series in Systems Engineering and Management Student Responsibilities: Students are expected to attend all classes, and are responsible for keeping themselves updated on any changes on the course website. In case of absence, it is the student’s responsibility to catch up with the material covered. Without advance notice and approval, no extensions or options to retake are provided if you miss any quizzes, exams, or assignments due to absence. Methods of Student Evaluation: Case Analyses; Class Participation, Assignments and Final Exam Honor Code: Students are obligated to strict adherence to the University honor system and code, as described in the current George Mason University catalog 2009-2010. Assignments submitted as part of this course may be tested for honor code violations using electronic tools and other means. All violations will be notified to the Honor Code Committee for enforcement of academic integrity. Office of Disability Service Statement: If you are a student with a disability and you need academic accommodations, please see the instructor and contact the Office of Disability Services (ODS) at 993-2474. All academic accommodations must be arranged through the ODS.