ISM530 – Enterprise Cybersecurity Credit Hours: Contact Hours: 3 This is a 3-credit course, offered in accelerated format. This means that 16 weeks of material is covered in 8 weeks. The exact number of hours per week that you can expect to spend on each course will vary based upon the weekly coursework, as well as your study style and preferences. You should plan to spend 10-25 hours per week in each course reading material, interacting on the discussion boards, writing papers, completing projects, and doing research. Faculty Information Name: Phone: CSU-GC Email: Virtual Office Hours: Course Description and Outcomes This course provides students with insight into the cybersecurity issues surrounding an enterprise. These include securing organizational data, responding to cyber- based security breaches, emerging technologies, and ensuring a secured computing environment for safeguarding company information. The course reviews the network security and cryptographic techniques that are currently being used. The nuances involved in defining cybersecurity strategies and complying with security standards to ensure governance are also discussed. Course Learning Outcomes: 1. Analyze possible threats to organizational data and recommend course(s) of action to mitigate cybercrime attacks. 2. Evaluate different authentication methodologies to provide solutions to secure information assets. 3. Explain how authentication is used with cryptography to secure information access. 4. Demonstrate the ability to recognize and communicate threats to organizational information assets. 5. Analyze and evaluate the commitment of foreign governments for the expansion of nationally owned telecommunications services for the support of business and government technologies. Participation & Attendance Prompt and consistent attendance in your online courses is essential for your success at CSU-Global Campus. Failure to verify your attendance within the first 7 days of this course may result in your withdrawal. If for some reason you would like to drop a course, please contact your advisor. Online classes have deadlines, assignments, and participation requirements just like on-campus classes. Budget your time carefully and keep an open line of communication with your instructor. If you are having technical problems, problems with your assignments, or other problems that are impeding your progress, let your instructor know as soon as possible. Course Materials Required: Dhillon, G. (2007). Principles of information systems security: Text and cases. Hoboken, NJ: John Wiley & Sons. ISBN: 9780471450566 Course Schedule Due Dates The Academic Week at CSU-Global begins on Monday and ends the following Sunday. Discussion Boards: The original post must be completed by Thursday at 12 midnight MT and Peer Responses posted by Sunday 12 midnight MT. Late posts may not be awarded points. Mastery Exercises: Students may access and retake mastery exercises through the last day of class until they achieve the scores they desire. Critical Thinking Activities: Assignments are due Sunday at 12 midnight MT. Week # 1 2 3 4 Readings Chapters 1 & 2 in Principles of Information Systems Security: Text and cases Grossman, J. (2013). The web won't be safe or secure until we break it. Communications of the ACM, 56(1), 6872. doi: 10.1145/2398356.2398373 Chapters 3 in Principles of Information Systems Security: Text and cases Whitmore, J. J. (2001). A method for designing secure solutions. IBM Systems Journal, 40(3), 747-768. Chapters 4 & 5 in Principles of Information Systems Security: Text and cases Kessler, G.C. (2013, March 4). An overview of cryptography. Retrieved from http://www.garykessler.net/library/crypto.html Chapters 6 & 7 in Principles of Information Systems Security: Text and cases Brechbuhl, H., Bruce, R., Dynes, S., & Johnson, M. E. (2010). Protecting critical information infrastructure: Assignments Discussion (25 points) Discussion (25 points) Critical Thinking (50 points) Discussion (25 points) Critical Thinking (100 points) Portfolio topic (0 points) Discussion (25 points) Critical Thinking (50 points) 5 6 7 8 Developing cybersecurity policy. Information Technology for Development, 16(1), 83-91. doi: 10.1002/itdj.20096 Chapters 8 & 9 in Principles of Information Systems Security: Text and cases Charitoudi, K., & Blyth, A. (2013). A socio-technical approach to cyber risk management and impact assessment. Journal of information security, 4(1), 33-41. doi: 10.4236/jis.2013.41005 Chapters 11 & 13 in Principles of Information Systems Security: Text and cases Gillon, K., Branz, L., Culnan, M., Dhillon, G., Hodgkinson, R., & MacWillson, A. (2011). Information security and privacy-rethinking governance models. Communications of AIS, 28(1), 561-570. Chapter 12 in Principles of Information Systems Security: Text and cases Rotvold, G. (2008). How to create a security culture in your organization. Information management journal, 42(6), 32-38. Chapter 14 in Principles of Information Systems Security: Text and cases Dittrich, D, Bailey, M., & Dietrich, S. (2011, July/August) Building an active computer security ethics community. IEEE Security & Privacy, 9(4), 32-40. Retrieved from http://web.eecs.umich.edu/~mibailey/publications/ieeesnp-ethics-2011.pdf Discussion (25 points) Critical Thinking (100 points) Portfolio Outline (0 points) Discussion (25 points) Critical Thinking (100 points) Discussion (25 points) Critical Thinking (50 points) Discussion (25 points) Portfolio (350 points) Assignment Details This course includes the following assignments/projects: Module 1 Portfolio Project Read the Portfolio Project Description on the Week 8 Assignments page. The Portfolio Project requires that you evaluate a major cybersecurity breach that has occurred in the recent past. Prior to Week 8, you will submit your topic choice in the assignment drop box in Week 3. In Week 5, you will submit an outline of your project in the drop box. The Portfolio Project will be due at the end of course. Module 2 Critical Thinking (CT) Assignment Case study (50 Points) View the case study from your textbook on Cisco Systems (linked to your course module). Do some research on recent trade secrets thefts. Examples can be found here: http://www.reuters.com/article/2013/02/21/us-usa-trade-secrets-idUSBRE91J0T220130221 http://caselaw.findlaw.com/us-4th-circuit/1558872.html http://www.prnewswire.com/news-releases/dupont-wins-trade-secret-case-against-kolon-industries129825528.html In an essay, answer the following questions based on your reading: 1. 2. What are the implications for Cisco and other companies if their trade secrets are compromised? How and why was it possible for hackers to breach the Cisco networks? What vulnerabilities exist at other companies? Provide information from your readings to support your statements. Your essay should be 2-3 pages in length and be wellwritten, should incorporate at least 2 academic sources from the CSU-Global Library in addition to the case study, and be in conformity with CSU-Global guidelines using CSU-Global APA formatting. Module 3 Critical Thinking (CT) Assignment Case Study (100 points) Click on the case study from your textbook entitled “Case of a Computer Hack” (linked to your course module). In an essay, answer the following questions based on this study: 1. 2. Do you think that the long-term counter attack actions that the organization had taken were adequate? In your opinion, do you think that the immediate counter attack actions helped the organization in any way? Provide information from your readings to support your statements. Your essay should be 2-3 pages in length and be wellwritten, should incorporate at least 2 academic sources from the CSU-Global Library in addition to the case study, and in conformity with CSU-Global guidelines using CSU-Global APA formatting. Portfolio Submit Topic (0 points) Review the instructions for the Portfolio Project in Module 8. Submit your portfolio topic in the assignment drop box. Include a paragraph describing why you chose that topic and what you problems you anticipate in researching your subject. No points are assigned for this deliverable, but points will be deducted from your final grade on the Portfolio Project if you fail to submit this item as required (see the Portfolio Project Rubric for grading details). Additionally, you will be expected to account for the instructor's feedback in the final version of the Portfolio Project assignment Module 4 Critical Thinking (CT) Assignment Case Study (50 points) View the case study on UC Berkley, in your textbook and linked to your module. In an essay, answer the following questions based on this study: 1. Name the policies and procedures that would enable universities to limit vulnerability while still allowing students access to systems. 2. Ultimately, who should be held responsible for maintaining security policy and how often should it be updated? Provide information from your readings to support your statements. Your essay should be 2-3 pages in length and be wellwritten, should incorporate at least 2 academic sources from the CSU-Global Library in addition to the case study, and be in conformity with CSU-Global guidelines using CSU-Global APA formatting. Module 5 Critical Thinking (CT) Assignment Case Study (100 points) View the case study from your textbook entitled “Security Management at the Tower”(linked to your course module). In an essay, answer the following questions based on this study: 1. Identify key cybersecurity competencies that the organization lacked. What role could the top management have played in ensuring that the organizational security competencies were adequately harnessed? 2. The problems at “The Tower” were a consequence of inadequate structures of responsibility. Discuss. Provide information from your readings to support your statements. Your essay should be 2-3 pages in length and be wellwritten, should incorporate at least 2 academic sources from the CSU-Global Library in addition to the case study, and be in conformity with CSU-Global guidelines using CSU-Global APA formatting. Portfolio Portfolio Outline (0 points) Submit an outline of your portfolio. Review the requirements of the portfolio in Module 8. The outline should reflect the security issue topic you chose in Module 3, and a list of all the required academic sources you will use as part of your portfolio. You will also provide an outline of your critical evaluation. Submit your outline in the assignment dropbox. Include with your outline a draft of your proposed sources, listed in correct APA format using CSU-Global APA formatting. No points are assigned for this deliverable, but points will be deducted from your final grade on the Portfolio Project if you fail to submit this item as required (see the Portfolio Project Rubric for grading details). Additionally, you will be expected to account for the instructor's feedback in the final version of the Portfolio Project assignment Module 6 Critical Thinking (CT) Assignment Case Study (100 points) View the case study from your textbook entitled “Computer Crime and the Demise of Barings Bank” (linked to your course module). Review also the recent fiasco at Societe Generale where Jerome Kerviel did something very similar to Nick Leeson. Some places to look: http://www.cio.com/article/188201/Lessons_from_Societe_Generale_s_Financial_Fiasco http://www.guardian.co.uk/business/2011/sep/15/who-are-worst-rogue-traders http://www.telegraph.co.uk/finance/comment/tracycorrigan/8045491/Jerome-Kerviel-case-why-is-it-so-rare-tosee-a-banker-behind-bars.html In an essay, answer the following questions based on these two events: 1. What governance practices could have prevented the demise of Barings Bank? Could the same practices have helped in the Societe Generale scandal? 2. What kind of technical, formal and informal controls would have helped Barings Bank develop a secure organization? Were those controls in place at Societe Generale? Provide information from your readings to support your statements. Your essay should be 2-3 pages in length and be wellwritten, should incorporate at least 2 academic sources from the CSU-Global Library in addition to the case study, and be in conformity with CSU-Global guidelines using CSU-Global APA formatting. Module 7 Critical Thinking (CT) Assignment Self-reflection (50 points) Review all the critical thinking assignments you have completed in this course. Prepare a critical review of what you learned about cyber security management in organizations. Present your self-reflection in 3 to 5 pages, double- spacing. View the CSU-Global Guide for Writing and APA Requirements to help you format your portfolio paper. You may also want to use the APA Template provided in the Library under the “APA Guide & Resources” link. Provide information from your readings and previous assignments to support your review. Cite your sources using CSU-Global APA formatting. PORTFOLIO: You should be in the final stages of polishing your presentation and report. Make sure you have reviewed the instructions from Week 8 and the Portfolio Project Rubric under Information. It is especially important that you reviewed, and acted upon, the feedback from your instructor on your topic and outline, as part of your grade is based on the improvements you have made. Module 8 PORTFOLIO (350 points) Identify a major cybersecurity breach that has occurred in the recent past (within the last 5 years). In an 8-10 page critical evaluation of your chosen breach, review and analyze the breach along the following dimensions: 1. 2. 3. 4. 5. What went wrong? Why it occurred? Who was responsible? How could it have been prevented? What advice would you offer to prevent such a breach from occurring in the future? Using MS Word, prepare a portfolio of 10-15 academic articles or other sources of information about the breach. Your portfolio might include scans or links to articles or media reports. Each item must have a caption crediting it, in complete CSU-Global APA format. Use your portfolio as evidence in support of your analysis of the chosen incident. Submit your portfolio as a single document. Multiple documents cannot be submitted for grading. The portfolio should reflect c CSU-Global guidelines using CSU-Global APA formatting and include a page of references in addition to the captions on each article. You may want to view the “Does your paper look like this?” sample paper found in the Library under the “APA Guide & Resources” link. Preliminary Deliverables You will submit your topic in Week 3 and your project outline in Week 5. Both assignments should be posted to the dropbox. No points are assigned for these deliverables, but points will be deducted from your final grade on the Portfolio Project if you fail to submit these items as required (see the Portfolio Project Rubric for grading details). Additionally, you will be expected to account for the instructor's feedback in the final version of the Portfolio Project assignment Course Policies Late Work Students are permitted a 7 day grace period during which they may submit a Critical Thinking assignment after the original due date without penalty. Papers submitted between 8 and 14 days after the original due date will be accepted with a potential 10 percent reduction in grade for late submission. Papers submitted 15 or more days beyond the original due date may not be accepted unless prior arrangements have been made with the instructor. No Portfolios will be accepted late and no assignments will be accepted after the last day of class unless a student has requested an incomplete grade in accordance with the Incomplete Policy. Course Grading 20% Discussion Participation 45% Critical Thinking Activities 35% Final Portfolio Paper Grading Scale and Policies A 95.0 – 100 A- 90.0 – 94.9 B+ 86.7 – 89.9 B 83.3 – 86.6 B- 80.0 – 83.2 C+ 75.0 – 79.9 C 70.0 – 74.9 D 60.0 – 69.9 F 59.9 or below FN* Failure for Nonparticipation I** Incomplete * Students who stop attending class and fail the course for nonparticipation will be issued the “FN” grade. The FN grade may have implications for financial aid and scholarship awards. ** An “I” grade may be assigned at the Instructor’s discretion to students who are in good standing (passing) in the course. Students should have completed a majority of the coursework in order to be eligible for the “I” grade. Students should request an "I" grade from the Instructor with a written justification, which must include explanation of extenuating circumstances that prevented timely completion of the coursework. If the request is approved, the Instructor will require a written agreement consisting of a) the specific coursework to be completed, b) the plan to complete the coursework, and c) the deadline for completion. The agreement will be kept on file at CSU-Global Campus. An incomplete course must be satisfactorily completed within the time frame stipulated in the agreement, but no later than the end of the following semester from the date the “I” was given. An incomplete not removed within one year shall convert to an F and be included in the computation of the student’s grade point average. Academic Integrity Students must assume responsibility for maintaining honesty in all work submitted for credit and in any other work designated by the instructor of the course. Academic dishonesty includes cheating, plagiarism, unauthorized possession of academic materials, and falsification. The Student Handbook provides information on how students can avoid plagiarism by understanding what it is and how to use library and internet resources appropriately with proper citation. Please refer to the Academic Catalog for complete policies regarding plagiarism and academic dishonesty. APA Students are expected to follow the CSU-Global APA requirements when citing in APA (based on the APA Style Manual, 6th edition). For details on CSU-Global APA style, please review the APA resources located under the Library tab in Blackboard. Netiquette All posts and classroom communication must be conducted in a professional and respectful manner in accordance with the student code of conduct. Think before you push the Send button. Did you say just what you meant? How will the person on the other end read the words? Any derogatory or inappropriate comments regarding race, gender, age, religion, sexual orientation, are unacceptable and subject to disciplinary action. If you have concerns about something that has been said, please let your instructor know. Institutional Policies Refer to the Academic Catalog for comprehensive documentation of CSU-GC institutional policies.