Information Security Planning – CSIS 341
CG • Section 8WK • 11/08/2019 to 04/16/2020 • Modified 04/06/2022
Course Description
This course will deal with the proper planning for and initial implementation of an Information Security program. The topics included would be: security planning and policies, risk analysis, program accreditation, systems lifecycle management, contingency planning, physical security measures, personal security practices and procedures, software security, network security, administrative controls, crypto security. (Formerly CSCI 351) (Crosslisted with BMIS 341)
For information regarding prerequisites for this course, please refer to the Academic Course Catalog.
Rationale
Information Security is an increasing concern in all sectors of US society – public, corporate, and personal. This course provides the student with an awareness of the threats to and vulnerabilities of our corporate and national security information systems, and develops the skills needed to design and evaluate information security policies, procedures and practices.
Measurable Learning Outcomes
Upon successful completion of this course, the student will be able to:
- Describe the process for the proper planning and initial implementation of an Information Security program.
- Demonstrate an understanding of security planning & policy development using risk analysis, personal security practices and procedures, as well as network security, crypto security and administrative controls.
- Describe security program accreditation, systems lifecycle management, contingency planning, and disaster recovery.
- Apply a biblical worldview to Information Security.
Assignment | Course Learning Outcome | ABET Course Outcome | Assignment | Course Learning Outcome | ABET Course Outcome |
Discussions: Defense in Depth, Authentication, Security Threats and Defenses, Security Planning, Policy and Regulations | 1, 2, 4 | a, b | Project: Pentesting& Network Exploitation Assignment | 1,2,3 | a,b |
Mid-Term Research Paper Assignment | 1, 2, 3, 4 | a, b | Project: CIRP Creation and Review of BCP and DRP Assignment | 1,2,3 | a,b |
Final Research Paper Assignment | 1, 2, 3, 4 | a, b | Project: Policy and Regulations | 1,2,3 | a,b |
Project: Patching with WSUS Assignment | 1, 2, 3 | a, b | Project: Comparing Controls Assignment | 1,2,3 | a,b |
Project: Manual Vulnerability Assessment Assignment | 1, 2, 3 | a, b | |||
Project: Vulnerability Scan Analysis Assignment | 1, 2, 3 | a, b |
Course Assignment
Textbook Readings
Course Requirements Checklist
After reading the Course Syllabus and Student Expectations, the student will complete the related checklist found in the Course Overview.
Discussions (5)
Discussions are collaborative learning experiences. Therefore, the student will participate in weekly activities by researching and addressing the topics provided for each module. During the weekly Discussion assignments on information security planning, the student will post 1 thread and 2 replies. Each thread must be at least 400 words, and each reply must be at least 200 words. Each thread and reply must be supported by at least 1 citation of a peer-reviewed source, in addition to the course textbook, and 1 biblical citation.
CybrScore Lab Assignments (7)
Mid-Term Research Paper Assignment
Final Research Paper Assignment