Information Security Management
(Cross-Listed with IS 572) Survey of security considerations as they apply to information systems analysis and design. Vulnerability assessment. Security audits. Access controls for Internet-based and internal systems. Firewalls. Data protection. Physical access controls. Security policies. Personnel and equipment security. Risk management. Legal requirements and considerations. Privacy. PREREQUISITE(S): Advisor Consent.