TECM 747 - Office of the Provost

advertisement
MASTER SYLLABUS
TECM 747: Information Assurance and Security Management
2 credit hour
Prerequisites:
Qualifying Requirements:
Admission to M.S. Technology Management (MSTM) program
Prerequisite Courses:
None
Programs:
M.S. Technology Management
Course Description:
The course broadly addresses the increasingly important area of information security and information
assurance. The coverage will stress on the need for and design of security controls in the current business
environment which is characterized by highly networked and flexible organization structures. Specific
focus will be on best practices for assessment, planning and management of information security controls
to minimize the risks pertaining to unauthorized use, processing, storage, and communication of digital
information. The course will also introduce the students to pertinent legislations and policy requirements.
Learning Objectives:
The overall objective is to develop an understanding of the CIO's information security roles and
responsibilities. Specific learning objectives include:
1.
2.
3.
4.
5.
Information systems threats and vulnerabilities
IT and Physical Security
Information privacy
Information security legislation, policies, and compliance
Enterprise architecture security framework and application.Information security governance.
CIO Core Competencies and Learning Objectives
10.0 Information Security/Information Assurance (IA)
10.1 CIO information security roles and responsibilities
10.2 Information security/related legislation, policies and procedures
10.3 Privacy and personally identifiable information
10.4 Information and information systems threats and vulnerabilities
10.5 Information security controls planning and management
10.8 Information security reporting compliance
Assurance of Learning:
Approach to Learning:
This course is geared for the student who intends to be a technology management professional engaged in
business, government, or the non-profit sector. The delivery will be in form of class-lectures and
discussions. Discussions on the subject matter will be motivated through case studies, and guest speakers.
Class participation, and critical analysis will be will be particularly emphasized.
Core Course Topics:
1.
2.
3.
4.
5.
6.
What is information security?
Identification, authentication and access control
Operations Security, Physical Security and Network Security
Data and Information Privacy
Development of Security Policies
Information Security Governance
Representative Text and Learning Materials:
1.
2.
Information Security: Contemporary Cases, by Marie A. Wright, John S. Kakalik; Publisher Jones &
Bartlett
Information Security Governance, Krag Brotby; Publisher Wiley Series in Systems Engineering and
Management
Student Responsibilities:
Students are expected to attend all classes, and are responsible for keeping themselves updated on any
changes on the course website. In case of absence, it is the student’s responsibility to catch up with the
material covered. Without advance notice and approval, no extensions or options to retake are provided if
you miss any quizzes, exams, or assignments due to absence.
Methods of Student Evaluation:
Case Analyses; Class Participation, Assignments and Final Exam
Honor Code:
Students are obligated to strict adherence to the University honor system and code, as described in the
current George Mason University catalog 2009-2010. Assignments submitted as part of this course may be
tested for honor code violations using electronic tools and other means. All violations will be notified to
the Honor Code Committee for enforcement of academic integrity.
Office of Disability Service Statement:
If you are a student with a disability and you need academic accommodations, please see the instructor and contact
the Office of Disability Services (ODS) at 993-2474. All academic accommodations must be arranged through the
ODS.
Download