Ethics, Legal Issues, and Policy – CSCI 561

CG • Section 8WK • 11/08/2019 to 04/16/2020 • Modified 07/28/2020

Course Description

This course covers ethical issues in computer and network security, legal issues, and business policy. It will teach students what the laws are concerning computer and network security, including the legal boundaries for breaking into systems without authorization. It will also cover the issues related to creating security policies for organizations, as well as the ethical responsibilities of protecting network and computer systems, and the ethical boundaries related to accessing other organizations systems.

Prerequisite

Admission into program

Rationale

The misuse of computer and information systems is fundamentally an ethical and legal issue. Understanding how ethics, laws, and policies apply to the cybersecurity situation is crucial to the study of this discipline.

Measurable Learning Outcomes

Upon successful completion of this course, the student will be able to:

  1. Describe the role of planning, management, policies, procedures, and personnel in protecting the confidentiality, integrity, and availability of information and computer systems.
  2. Describe the nature of specific threats, such as malicious code, network attacks, and hostile content.
  3. Explain the techniques and methodologies of widely used countermeasures to many common threats.
  4. Assess the legal, ethical, and societal issues associated with computer systems.
  5. Integrate biblical principles within the field of computer security.

Course Assignment

Textbook readings and presentations

Course Requirements Checklist

After reading the Course Syllabus and Student Expectations, the student will complete the related checklist found in Module/Week 1.

Discussion Board Forums (4)

Discussion boards are collaborative learning experiences. Therefore, the student will create a thread in response to the provided prompt for each forum. Each thread must be at least 350 words and demonstrate course-related knowledge. In addition to the thread, the student will reply to at least 2 classmates’ threads. Each reply must be at least 150 words.

Article Reviews (3)

The student will use the provided template to complete 3 article reviews. Each article review must be at least 750 words, be in current APA format, and demonstrate course-related knowledge with biblical implications.

Policy Research Paper: Topic Proposal and Outline

The student will submit a topic proposal and a topical outline in current APA format for the Policy Research Paper.

Policy Research Paper: Final

The student will write a research-based paper of 2750–3250 words that focuses on policy in computer systems and security. The paper must be in current APA format and must include at least 5 references in addition to the course textbooks and the Bible.

Technology Research Paper: Topic Proposal and Outline

The student will submit a topic proposal and a topical outline in current APA format for the Technology Research Paper.

Technology Research Paper: Final

The student will write a research-based paper of 2750–3250 words that focuses on technology in computer systems and security. The paper must be in current APA format and must include at least 5 references in addition to the course textbooks and the Bible.