Professional Documents
Culture Documents
ISM 3323 Syllabus Summer 2019
ISM 3323 Syllabus Summer 2019
ISM 3323 Syllabus Summer 2019
Required Textbooks:
Management of Information Security, 6th Edition, Michael E. Whitman, Herbert J. Mattord
ISBN-10: 137-10206 ISBN-13: 978-1-337-10206-3, Course Technologies 2018
There will be multiple pdf readings handed out in class.
Information security in the modern organization is both a management and a technology issue.
Technology can not address all of the security issues alone. The focus of this course is an in-depth
study of management and control of the security function of the information systems in business
organizations as opposed to the implementation of security technology. Topic areas include IT controls
and their evaluation, computer-based auditing techniques, encryption, risk analysis, contingency
planning, and perimeter controls. Recent developments in IT such as nomadic computing and Internet
and their impact on IT security management will also be explored. Security is a growing problem that
has important economic consequences for which management will be held accountable.
Course Objectives:
Define security management as it relates to the business model.
Understand of and the uses of risk analysis.
Gain the knowledge necessary to communicate with security administrators and technicians and
participate in design, development, implementation, use, and maintenance of security systems.
Understand Public Key Infrastructure and the associated cryptographic tools.
Develop an understanding of contingency planning and disaster recovery.
Make informed decisions in regards of the administering of a security infrastructure.
minute technical problem that you may encounter when trying to submit your work just before the
deadline. Please be wise and manage your time effectively and efficiently to avoid negative
consequences of missing a deadline when submitting your work electronically.
All readings and assigned materials are to be completed prior to class period. The instructor will
supplement the text with current events articles and discussion. Students should also be reading
articles in the popular computer press to increase their knowledge of the area and to provide a better
background to the class material.
PowerPoint Slides
The slides used in class are available in pdf format and will be posted in eLearning prior to class. You
will need Adobe reader or similar software to read the pdf file. Adobe reader (free) can be downloaded
at http://www.adobe.com/products/acrobat/readermain.html
PROJECTS:
The CCERP-JCERP Template and Style Guide for Authors is located in the admin section of the
eLearning web site and is a complete guide on how the paper should be formatted.
All of the components should be in a single file using the student’s email name as the file name.
The best papers will be considered for submission to the student track of Conference on
Cybersecurity Education, Research & Practice 2019 conference. The conference is scheduled for
11-12 October in Kennesaw Ga. Selected papers will be submitted for support to include
conference registration, travel, lodging and meals. The Research paper is due 11:30 pm Sunday 28
July
ISM 3323 – Information Security Management
Summer Semester, 2019
Selected Readings:
There will be a number readings posted in eLearning throughout the semester. They will be discussed
during the and there will a quiz covering all of the readings. Additional details will be distributed later
in the semester. The Readings quiz will be taken on-line, the Quiz Window is: 9:00am Tue 11 Jun –
11:30pm Thurs. 12 June.
Grading Procedures:
The course grades will be determined using the following weights:
Exams (2) 30% each
Research Project 20%
Security Readings Quiz 10%
Encryption Quiz 10%
Total 100%
All the scores for quizzes, homework, and the midterm and final exam will be posted on eLearning. It is your
responsibility to closely monitor your scores throughout the semester and contact me if you have a
question/concern in a timely manner.
The following course average scores will be utilized to determine course letter grades. There is no
"curve" or "scale" - this is it!
Notes:
1) The instructor reserves the right to lower the grading scale but it will not be raised.
2) Scores on graded work will not be distributed of unsecured media channels.
EMAIL:
I will be using the group mail facility available for this class to send out timely information to the
class. Email will only be sent to the student’s UWF account. Make sure that the email address
that you have listed is current and that you check your email regularly during the term.
SOCIAL MEDIA
I do not connect with students on any social media until they have graduated.
DISABILITY COMPLIANCE:
The University of West Florida supports an inclusive learning environment for all students. If there are
aspects of the instruction or design of this course that hinder your full participation, such as time-
limited exams, inaccessible web content, or the use of non-captioned videos and podcasts, reasonable
accommodations can be arranged. Prior to receiving accommodations, you must register with Student
Accessibility Resources. Appropriate academic accommodations will be determined based on the
documented needs of the individual. For information regarding the registration
process, www.uwf.edu/sar, e-mail sar@uwf.edu or call 850.474.2387.
ISM 3323 – Information Security Management
Summer Semester, 2019
Here is my attempt to summarize the main points. If you have additional questions, please do not
hesitate to ask me or other campus experts.
1. The office of Disabled Student Services in Bldg 21, Room 130; Phone: 474-2387, email:
sdrc@uwf.edu.
2. A student with special needs has an obligation to inform me of her/ his needs in a timely manner.
For example, student can’t mention it casually at the start of an exam that they have special needs.
3. The Office of Disabled Student Services will evaluate the case to determine if the student qualifies
for special accommodation. If so, this office will determine what special accommodation is needed.
4. There is no waiver for essential requirements of this courses only appropriate accommodation.
As members of the University of West Florida, we commit ourselves to honesty. As we strive for
excellence in performance, integrity – both personal and institutional – is our most precious asset.
Honesty in our academic work is vital, and we will not knowingly act in ways to erode that integrity.
Accordingly, we pledge not to cheat, nor to tolerate cheating, nor to plagiarize the work of others. We
pledge to share community resources in ways that are responsible and that comply with established
policies of fairness. Cooperation and competition are means to high achievement and are encouraged.
Indeed, cooperation is expected unless our directive is to individual performance. We will compete
constructively and professionally for the purpose of stimulating high performance standards. Finally,
we accept adherence to this set of expectations for academic conduct as a condition of membership in
the UWF academic community.
ISM 3323 – Information Security Management
Summer Semester, 2019