Information Operations and Security – BMIS 665

CG • Section 8WK • 11/08/2019 to 04/16/2020 • Modified 02/01/2024

Course Description

Operations Security is used to identify the controls over hardware, media and the operators with access privileges to any of these resources. This course will look at the mechanisms, tools and facilities that permit the identification of security events and subsequent actions that follow identification. The course will address the threats, vulnerabilities and countermeasures that can be utilized to physically protect an enterprise's resources and sensitive information. A study of Business Continuity and Disaster Recovery Planning addresses the preservation of the business in face of major disruption to normal business operations will also be included. The preparation, testing and updating of specific actions to protect critical business processes from the effects of major system and network failures will be explored.

For information regarding prerequisites for this course, please refer to the Academic Course Catalog.

Rationale

This course completes the Information Assurance cognate in a new program: Masters of Information Systems.

Course Assignment

Textbook readings and lecture presentations

Course Requirements Checklist

After reading the Syllabus and Student Expectations, the student will complete the related checklist found in the Course Overview.

Discussions (7)

Discussions are collaborating learning experiences. Therefore, the student will complete varying types of Discussions throughout the course. Each thread must be at least 500 words and demonstrate course knowledge. The student must also respond to 3 other classmates’ threads with at least 250 words in each reply. For each thread, students must support their assertions with at least 2 scholarly citations in APA format. Each reply must incorporate at least 2 scholarly citations in APA format. For Discussion: Trust Associated with Cyber Security and Discussion: Biblical Integration - Ethical Hacker Scenario, threads must incorporate at least 4 passages of Scripture and 2 peer-reviewed sources and the replies must include 2 biblical references.

Project Assignments (3)

The student is required to create a security solution in 3 phases. The objective of the final, comprehensive project is to apply the learning objectives of the Information Assurance program to the project. The students will show competence through the execution of a final information security solution and business continuity plan.

Quizzes (4)

There are four quizzes for this course. Each quiz will cover the course material for the modules in which they are assigned. Each quiz will be open-book/open-notes, contain 25 multiple-choice questions, and have a 20 minute time limit.