Information Operations and Security – BMIS 665
CG • Section 8WK • 11/08/2019 to 04/16/2020 • Modified 07/28/2020
Operations Security is used to identify the controls over hardware, media and the operators with access privileges to any of these resources. This course will look at the mechanisms, tools and facilities that permit the identification of security events and subsequent actions that follow identification. The course will address the threats, vulnerabilities and countermeasures that can be utilized to physically protect an enterprise’s resources and sensitive information. A study of Business Continuity and Disaster Recovery Planning addresses the preservation of the business in face of major disruption to normal business operations will also be included. The preparation, testing and updating of specific actions to protect critical business processes from the effects of major system and network failures will be explored.
BMIS 510, 520, 530 and 662
This course completes the Information Assurance cognate in a new program: Masters of Information Systems.
Measurable Learning Outcomes
Upon successful completion of this course, the student will be able to:
- Discuss the relevance of course material and the use of technology to a biblical worldview.
- Demonstrate the mechanisms and devices necessary to build a secure organization.
- Assess security threats, vulnerabilities, and countermeasures.
- Implement appropriate security measures to prevent system and network intrusion.
- Use various relevant system and network security controls.
- Develop a business continuity and disaster recovery plan.
Textbook readings and lecture presentations/notes
Course Requirements Checklist
After reading the Syllabus and Student Expectations, the student will complete the related checklist found in Module/Week 1.
Discussion Board Forums (7)
The student will complete varying types of Discussion Board Forums throughout the course. Each thread must be at least 500 words and demonstrate course knowledge. The student must also respond to 3 other classmates’ threads with at least 250 words in each reply. Forums will also require peer-reviewed sources/references as indicated.
The student is required to create a security solution in 3 phases. The objective of the final, comprehensive project is to apply the learning objectives of the Information Assurance program to the project. The students will show competence through the execution of a final information security solution and business continuity plan.
There is a midterm and final exam for this course. Each exam will cover the Reading & Study material for the modules/weeks in which they are assigned. Each exam will be open-book/open-notes, contain 50 multiple-choice questions, and have a 1-hour time limit.