Course Outline Uci 403

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 3

MSU/RASA/F.

60

MASENO UNIVERSITY

OFFICE OF THE REGISTRAR ACADEMIC & STUDENT AFFAIRS)

COURSE OUTLINE FORM

SCHOOL: COMPUTING AND ENGINEERING DEPARTMENT: COMPUTER SCINCE

COURSE CODE/TITLE: UCI 403: INFORMATION ASSURANCE AND SECURITY

COURSE DESCRIPTION:

This course provides the foundations of information assurance and security from a business
prospective. Topics covered include human factors, compliance with regulations, personnel security,
risk assessment and ethical considerations.
Best practices, basic policies and procedures, ethics, and fundamental legal issues will be explored.
Risk Management and Disaster Recovery as applied to Information Assurance/Security will be
investigated. Ethics and vulnerability issues will be also be covered.

COURSE OBJECTIVES:

 Understanding vulnerabilities, threats, and risks (INFOSEC, OPSEC, Software Security,


and Information Security).
 Understanding the concepts of security policies.
 Understand basic security mechanisms used in order to protect information (Planning and
Management, Access Control).
 Understand physical security and personnel security (Roles of Various Organizational
Personnel).
 Understand the development of the information assurance infrastructure and The Security
Systems Development Life Cycle.
 Understand the importance of human factors like ethics in the process of information
assurance.

LECTURER’S NAME: MR. OYENGO SILAS TOBOSO. TEL. 0723020703.


SIGNATURE: DATE:

CLASS REP. NAME: Emmanuel Chiteri TEL. 0701038943


SIGNATURE: _____________ DATE:__________

MASENO UNIVERSITY ISO 9001:2008 CERTIFIED


MSU/RASA/F.60

Week Topic
1 Introduction to Information Security:
What is security? CNSS (NSTISSI-4011) Security Model. Components of an Information
System. Approaches to Information Security Implementation. The system Development
Life Cycle. The Security Systems Development Life Cycle. Security professionals and the
Organization.
2 The Need for Security:
Business Needs First, Threats, Attacks, Secure Software Development

3 Legal, Ethical, and Professional Issues in Information Security:


Laws and Ethics in Information Security. Relevant U.S. Laws. International Laws and
Legal Bodies. Ethics and Information Security. Codes of Ethics and Professional
organizations.
4 Risk Management:
Overview, Risk identification, Risk Assessment, Risk Control Strategies, Quantitative vs.
Qualitative Risk Control Practices. Risk Management.
5 Planning for Security
Information Security Planning and Governance, Information Security Policy Standards,
and Practices, The Information Security Blueprint, Security education, Training, and
Awareness program, Continuity Strategies.
6 Security Technology:
Firewalls and VPNs: Access Control, Firewalls, protecting remote Connections.
7 Security Technology:
Intrusion Detection, Access Control, and other Security Tools: Intrusion Detection and
Prevention Systems, Honeypots, Honey nets, and Padded Cell Systems, Scanning and
Analysis Tools, Biometric Access Controls
8 Cryptography:
Foundations of Cryptography, Cipher Methods, Cryptographic Algorithms, Cryptographic
Tools, Protocols for Secure Communications, Attacks on Cryptosystems
9 Physical Security:
Physical Access Controls, Fire Security and safety, Failure of Supporting Utilities and
Structural Collapse, Interception of Data, Mobile and Portable Systems.
10 Implementing Information Security:
Information Security Project Management, Technical and Non-Technical Aspects of
Implementation, Information Systems Security Certification and Accreditation.
11 Security and Personnel
: Positioning and Staffing the security Function, Credentials of Information Security
Professionals, Employment Policies and Practices, Security Considerations for
Nonemployees, Internal Control Strategies, Privacy and the security of Personnel Data
12 Information Security Maintenance:
Security Management Maintenance Models. Digital Forensics.

MASENO UNIVERSITY ISO 9001:2008 CERTIFIED


MSU/RASA/F.60

ASSESSMENT STRATEGY:

There are three (3) scheduled exams for this course. This includes the final. The exam format will
typically be multiple choices, short answers and essays. Online exams will be administered. Every
exam covers all the content covered in the book, home works and projects. Exams will not be curved
and must be taken individually.

Academic Honesty.

Each student is expected to engage in all academic pursuits in a manner that is above
reproach. Students are expected to maintain complete honesty and integrity in the online academic
experiences. Any student found guilty of academic dishonesty will be subject to disciplinary action
as outlined in the University Student Handbook and University Code of Student Conduct.

REFERENCES:

Michael E. Whitman and Herbert J. Mattord. Principles of Information Security, 4rd Edition. Course
Technology CENGAGE Learning. ISBN 1-111-13821-4

HEAD OF DEPARTMENT……………………………………………………………..

SIGNATURE:……………………………………………… DATE:……………………

MASENO UNIVERSITY ISO 9001:2008 CERTIFIED

You might also like