Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 2

Takoradi Technical University

Computer Science Deparment


Programme: HND ICT
Course: INFORMATION SYSTEMS SECURITY 1
Course credit: 3 HOURS
Academic year: 2018/2019 Academic Year

COURSE OUTLINE: INFORMATION SYSTEMS SECURITY 1

Students learning outcomes

The learning outcome is students shall be able to understand what are the common threats
faced today, what are the foundational theory behind information security, what are the basic
principles and techniques when designing a secure system, how to think adversarially, how
today's attacks and defenses work in practice, how to assess threats for their significance, and
how to gauge the protections and limitations provided by today's technology

Delivery: This course is delivered face to face

Metrics & Mode of Assessment


Mid- Semester Exams and Class Tests – 40%
End of Semester Exams – 60%

Course Topics

Security management practices

a. Concept of information security management


b. The information classification process
c. Security policy implementation
d. The roles and responsibility of security administration
e. Risk management assessment tools(including valuation rationale)
f. Security awareness training

Access control systems

a. Controls
b. Control methodologies
c. Access control issues

Cryptography

a. Definitions
b. History
c. Cryptography fundamentals
d. Symmetric key cryptosystem fundamentals
e. Asymmetric key cryptosystem fundamentals
f. Key distribution and management
g. Public key infrastructure definitions and concepts
1
Business continuity planning (BCP) and disaster recovery planning (DRP)

a. The basic difference between BCP and DRP


b. The difference between natural and manmade disasters
c. The four prime elements of BCP
d. The reasons for the steps in conducting Business Impact Assessment (BIA)

Physical security

a. The elements involved in choosing a secure site, its design and implementation
b. The methods for securing a facility against unauthorized access
c. The methods for securing either the equipment or its contained information against
theft
d. The environmental and safety measures needed to protect personnel, and the facility,
and its resources

Recommended books
1. Certified Information Systems Security study guide, sixth edition, James M. Stewart,
Mike Chapple, Darril Gibson
2. Fundamentals of Information Systems Security, second edition, David Kim and
Michael G. Solomon

Course Policies

 Each Student is expected to be in attendance in every class period


 In case of illness, emergencies etc, students are required to inform the instructor
personally or through email. You are responsible for all materials covered in lectures.
 Class assignments due dates must be adhered to.
 Keep a journal for each topic and report on what you’ve learnt this semester.
 Do not disturb the class with cell phones, lateness or other distractions.
 Any student who is found or reported cheating or exercising any form of dishonesty
will be subjected to summarily disciplinary action in accordance with the Polytechnic
and Department policies.

Mr. Emmanuel Yanney (Computer Science Department)


emmanuel.nyanney@gmail.com
Auditorium Room 13
024 6 357026

You might also like