BMIS 663 Secure Enterprise Design and Development
Course Description
For information regarding prerequisites for this course, please refer to the Academic Course Catalog.
Course Guide
View this course’s outcomes, policies, schedule, and more.*
*The information contained in our Course Guides is provided as a sample. Specific course curriculum and requirements for each course are provided by individual instructors each semester. Students should not use Course Guides to find and complete assignments, class prerequisites, or order books.
Rationale
In the competitive marketplace of today, firms must operate efficiently by continually monitoring activities for reducing costs and increasing revenues. Such efficiencies rely on a stable enterprise architecture where systems are interconnected and information is secure. The importance of a well-designed, well-developed, and well-managed enterprise is paramount in order for firms to leverage pertinent data and make this information available for knowledge workers dispersed throughout the corporate organization. BMIS 663 assists in this regard by providing a thorough review of the necessary computer security components needed to maintain a secure enterprise.
Course Assignment
Textbook readings and lecture presentations
No details available.
Course Requirements Checklist
After reading the Course Syllabus and Student Expectations, the student will complete the related checklist found in the Course Overview.
Discussions (8)
Discussions are collaborative learning experiences. Therefore, the student will complete the assigned textbook readings in each module: week and post a thread of at least 250 words containing thoughtful answers to 2 questions from the assigned reading. If necessary, the student may also list within his/her thread any concepts on which further clarification is needed. The student must then reply to at least 2 classmates’ threads. A reply to a classmate’s request for clarification will be accepted as 1 of the 2 required replies. Each reply must contain at least 150 words. Any sources used to support the initial thread and/or replies should be cited according to current APA format.
Project Feasibility Study Assignment
The student will select a business in order to begin research on the Final Project. The objective of this project is to analyze, design, and plan to implement a secure enterprise information system in a 7-page paper. The paper must include a statement of the business that has been selected, the anticipated outcomes for the project, and a feasibility study of the company selected in order to demonstrate the company’s ability to follow through in the student’s chosen direction. The paper should include 5 pages discussing the review of the literature (this section should contain the statement of the business, the anticipated outcomes, and project feasibility study), 1 page discussing the project’s scope, and 1 page discussing the project’s objectives for a total of 7 pages of content. The paper should also include an introduction and conclusion in excess to the 7 content pages. The paper must incorporate professional writing, current APA standards, and at least 5 scholarly, peer reviewed references (e.g., peer-reviewed journal articles). The student should be sure to include both the course textbook and/or other course readings as well as other outside scholarly sources within the 5 required sources.
Secure Network Application Project Assignment
Using Microsoft Visio or a subsequent visual design tool, the student will diagram a network of which he/she is familiar and write a thorough report detailing the design. The report must be a minimum of 5 pages excluding the title page, diagram(s), and references. It must include, at a minimum, 5 scholarly, peer-reviewed sources to justify the design. The student should be sure to include both the course textbook and/or other course readings as well as other outside scholarly sources within the 5 required sources. The design that the student provides will contain, at a minimum, several components as listed within the assignment instructions, and it must meet industry best practices based on appropriate research within the student’s literature review. The paper should be formatted according to current APA style.
Firewall Application Project Assignment
Utilizing the secure network design from the Secure Network Application Project Assignment, the student will develop an appropriate set of firewall rules and access control lists. Using appropriate professional research, the student will document the necessary access information for the designed information system. The rules that the student provides must meet the business requriements of the given information system design. Using a firewall of choice such as IPFW or IP Tables, the student will design rules for each of the 4 firewalls in his/her design and write a thorough report detailing the design. The project must be a minimum of 5 pages (excluding the title page, firewall rules, and references). The student should note that the set of firewalls rules does not count towards the 5 pages of required written content for this assignment. The paper should follow current APA standards and include a minimum of 5 peer-reviewed, scholarly sources. The student should be sure to include both the course textbook and/or other course readings as well as other outside scholarly sources within the 5 required sources.
Final Project Assignment
The student will prepare a research paper that is 25 pages, not including the title page and reference page. The objective of this paper is to analyze, design, and plan to implement a secure enterprise information system. The research must demonstrate thoughtful consideration of the ideas and concepts presented in the course and provide new thoughts and insights relating directly to the topic of information security planning.
For this project, the student will select an appropriate business of which he/she is familiar and research and identify security threats, risks, vulnerabilities, and flaws in the current IT enterprise system of the selected business. A complete literature review will accompany the security plan to determine appropriate security solutions to the problems the student identified. In addition to peer-reviewed, scholarly research, the student will identify appropriate security standards that are relevant to the organization, which includes appropriate best practices that must be followed and used as a guide in designing enterprise security policies and secure solutions. After all of this information is researched and analyzed, the student will develop an appropriate enterprise security design for the information system.
Of the 25 required pages, at least 15 pages of the paper must contain appropriate literature review, research, and design, and at least 10 pages must contain proper diagrams. The paper must reflect professional writing and current APA standards, and it must include a minimum of 10 peer-reviewed, scholarly references (e.g., peer-reviewed journal articles) along with any sources necessary to discuss the security and industry standards within the paper. The student should be sure to include both the course textbook and/or other course readings as well as other outside scholarly sources within the 5 required sources.
Quizzes (3)
The quizzes will cover various portions of Learn material contained within the modules: weeks in the course. Each quiz will be open-book/open-notes, will allow for one attempt, will contain 12 multiple-choice questions, and will have a time limit of 20 minutes.
Quiz: Midterm
The exam will cover the Learn materials for Module 1: Week 1 – Module 4: Week 4. It will be open-book/open-notes, allow for one attempt, contain 68 multiple-choice questions, and have a time limit of 2 hours.

Have questions about this course or a program?
Speak to one of our admissions specialists.
Inner Navigation
Have questions?