Secure Enterprise Design and Development – BMIS 663
CG • Section 8WK • 11/08/2019 to 04/16/2020 • Modified 10/27/2020
This course includes studies in security architecture and applications security. A detailed look will be given at the concepts, principles, structures and standards used to design, implement, monitor and secure operating systems, equipment, networks and applications. The course will explore controls used to enforce various levels of confidentiality, integrity, and availability.
For information regarding prerequisites for this course, please refer to the Academic Course Catalog.
In the competitive marketplace of today, firms must operate efficiently by continually monitoring activities for reducing costs and increasing revenues. Such efficiencies rely on a stable enterprise architecture where systems are interconnected and information is secure. The importance of a well-designed, well-developed, and well-managed enterprise is paramount in order for firms to leverage pertinent data and make this information available for knowledge workers dispersed throughout the corporate organization. BMIS 663 assists in this regard by providing a thorough review of the necessary computer security components needed to maintain a secure enterprise.
Measurable Learning Outcomes
Upon successful completion of this course, the student will be able to:
- Discuss the relevance of course material and the use of technology to a biblical worldview.
- Compare modern information security standards.
- Explain access control theory.
- Apply access control theory.
- Distinguish physical and operations security.
- Illustrate secure design principles for systems, networks, and applications.
Textbook readings and lecture presentations
Course Requirements Checklist
After reading the Course Syllabus and Student Expectations, the student will complete the related checklist found in Module/Week 1.
Discussion Board Forums (8)
Discussion boards are collaborative learning experiences. Therefore, the student will complete the assigned textbook readings in each module/week and post a thread of at least 250 words, containing thoughtful answers to 2 questions from the assigned reading. No more than 4 students may answer the same question. If necessary, the student may also list within his/her thread any concepts on which further clarification is needed. The student must then reply to at least 2 classmates’ threads. A reply to a classmate’s request for clarification will be accepted as 1 of the 2 required replies. Each reply must contain at least 150 words.
Project Feasibility Study
The student will select a business in order to begin research on the Final Project. The objective of this project is to analyze, design, and plan to implement a secure enterprise information system. The paper must incorporate professional writing, current APA standards, and at least 5 scholarly references (e.g., peer-reviewed journal articles).
Secure Network Application Project
Using Microsoft Visio or a subsequent visual design tool, the student will diagram a network and write a thorough report detailing the design. The report must be a minimum of 5 pages (excluding the title page), Visio diagram(s), and references. It must include, at a minimum, 5 peer-reviewed sources to justify the design.
Firewall Application Project
The student will develop an appropriate set of firewall rules and access control lists. Using appropriate professional research, the student will document the necessary access information for the designed information system. The project must be a minimum of 5 pages (excluding the title page, firewall rules, and references), follow current APA standards, and include a minimum of 5 peer-reviewed sources.
The student will prepare a research paper that is 25 pages, not including the title page and reference page. The research must demonstrate thoughtful consideration of the ideas and concepts presented in the course and provide new thoughts and insights relating directly to the topic of information security planning. The overall goal of this project is to develop, introduce, discuss, and present a specific policy as part of an information security plan. Additionally, the paper must reflect professional writing, current APA standards, and include a minimum of 10 scholarly references (e.g., peer-reviewed journal articles).
Each quiz will cover the Reading & Study material up to and including the module/week in which it is assigned. Each quiz will be open-book/open-notes, contain 12 multiple-choice questions, and have a time limit of 20 minutes.
The exam will cover the Reading & Study materials for Modules/Weeks 1–4. It will be open-book/open-notes, contain 68 multiple-choice questions, and have a time limit of 2 hours.