ClassInfo

CNS 440 Information Security Management (Formerly CNS 440)

Spring 2014-2015
Class number: 30532
Section number: 910
-
Online Campus

Download syllabus

Summary

This course is a survey of information security considerations as they apply to information systems analysis, design, and operations. Topics include information security vulnerabilities, threats, and risk management; security policies and standards; security audits; access controls; network perimeter protection, data protection; physical security; legal requirements and considerations; privacy.



Texts

Recommended text - Fundamentals of Information Systems Security, by Kim and Solomon. Required lab access - You will also need the Virtual Lab Access from the publisher, Jones & Bartlett Learning. There will be a charge to purchase the lab access. Details about the lab access will be provided during the first class session.


Grading

Class participation - 10%; There will be a discussion prompt presented each week. In-class students will form small groups to respond to the prompt. Ideas from the small groups will be presented to the class. Online students will write 1-to-2 paragraphs in response to the prompt and submit them via D2L Discussion Forum. Homework - 60%; Final Assignment - 30%


Prerequisites

None


Introduction to Information Security, terminology and concepts, course structure. Introduction to a Security Program

Attack vectors, threats. Readings: Kim and Solomon, Chapter 3. Additional readings or articles will be assigned during Week 1. These are to be read prior to Week 2 class meeting. Risk Management. Readings: Kim and Solomon, Chapter 8, pages 248 through 263. Additional readings or articles will be assigned during Week 2. These are to be read prior to Week 3 class meeting. Planning for Security and Access Control. Readings: Kim and Solomon, Chapter 8, pages 263 - 267, and Chapter 5. Additional readings or articles will be assigned during Week 3. These are to be read prior to Week 4 class meeting. Technical controls. Readings: Kim and Solomon, Chapter 6, pages 199 - 203, Chapter 10, 329 - 335, and Chapter 11, pages 372 - 377. Additional readings or articles will be assigned during Week 4. These are to be read prior to Week 5 class meeting. Technical controls (continuation). Readings: Kim and Solomon, Chapter 9. Additional readings or articles will be assigned during Week 5. These are to be read prior to Week 6 class meeting. Physical Security and Application Security. Readings or articles will be assigned during Week 6. These are to be read prior to Week 7 class meeting. Legal and Ethical Considerations. Readings: Kim and Solomon, Chapter 6, pages 187 - 189, and Chapter 15. Additional readings or articles will be assigned during Week 7. These are to be read prior to Week 8 class meeting. Validate the Security Program. Readings: Kim and Solomon, Chapter 7. Additional readings or articles will be assigned during Week 8. These are to be read prior to Week 9 class meeting. Sustain the Security Program. Readings: Kim and Solomon, Chapter 12, pages 393 - 395. Additional readings or articles will be assigned during Week 9. These are to be read prior to Week 10 class meeting.

School policies:

Changes to Syllabus

This syllabus is subject to change as necessary during the quarter. If a change occurs, it will be thoroughly addressed during class, posted under Announcements in D2L and sent via email.

Online Course Evaluations

Evaluations are a way for students to provide valuable feedback regarding their instructor and the course. Detailed feedback will enable the instructor to continuously tailor teaching methods and course content to meet the learning goals of the course and the academic needs of the students. They are a requirement of the course and are key to continue to provide you with the highest quality of teaching. The evaluations are anonymous; the instructor and administration do not track who entered what responses. A program is used to check if the student completed the evaluations, but the evaluation is completely separate from the student’s identity. Since 100% participation is our goal, students are sent periodic reminders over three weeks. Students do not receive reminders once they complete the evaluation. Students complete the evaluation online in CampusConnect.

Academic Integrity and Plagiarism

This course will be subject to the university's academic integrity policy. More information can be found at http://academicintegrity.depaul.edu/ If you have any questions be sure to consult with your professor.

All students are expected to abide by the University's Academic Integrity Policy which prohibits cheating and other misconduct in student coursework. Publicly sharing or posting online any prior or current materials from this course (including exam questions or answers), is considered to be providing unauthorized assistance prohibited by the policy. Both students who share/post and students who access or use such materials are considered to be cheating under the Policy and will be subject to sanctions for violations of Academic Integrity.

Academic Policies

All students are required to manage their class schedules each term in accordance with the deadlines for enrolling and withdrawing as indicated in the University Academic Calendar. Information on enrollment, withdrawal, grading and incompletes can be found at http://www.cdm.depaul.edu/Current%20Students/Pages/PoliciesandProcedures.aspx.

Students with Disabilities

Students who feel they may need an accommodation based on the impact of a disability should contact the instructor privately to discuss their specific needs. All discussions will remain confidential.
To ensure that you receive the most appropriate accommodation based on your needs, contact the instructor as early as possible in the quarter (preferably within the first week of class), and make sure that you have contacted the Center for Students with Disabilities (CSD) at:
Lewis Center 1420, 25 East Jackson Blvd.
Phone number: (312)362-8002
Fax: (312)362-6544
TTY: (773)325.7296