Syllabus_612_Spring 2024
docx
keyboard_arrow_up
School
Hampton University *
*We aren’t endorsed by this school
Course
500
Subject
Information Systems
Date
Feb 20, 2024
Type
docx
Pages
6
Uploaded by AdmiralLemurMaster472
Center for Applied Information Technology
AIT612 – Information Systems Vulnerability and Risk Analysis
Spring 2024
(Section 101 -- Online Instruction)
Instructor:
Prof. Arthur Friedman
Email:
afriedman@towson.edu
Office Hours:
By email and appointment
Course Hours:
7:30 pm to 10:10 pm Course Location:
Online
Course Website:
Blackboard
Prerequisite:
Admission into the MS AIT certificate graduate program
, completion of CAIT 500, and
CAIT 600 or equivalents.
Course Description: Corporations and government organizations must implement security controls for
managing risk to minimize the impact of cyber-attacks, insider threats, and ensure the integrity and
privacy of data is maintained. This course introduces the fundamental core concepts of information
security from a risk management perspective. The course emphasizes applying information security
controls and demonstrating an understanding of IT security through student assigned homework, case
studies, and research. Course Objectives:
Upon completion of the course, students will understand and be familiar with:
The concepts of threat, vulnerability, and risk management.
The identification, authentication and access control.
The methods used for intrusion detection.
The steps involved in responding to and recovering from an intrusion.
The basic concepts of cryptography, biometrics, wireless security, and forensics.
Current attack trends and how to defend against such attacks.
The legal framework and ethical issues associated with information security.
How to utilize the Internet to locate information security tools and resources.
The various best security practices used in government and industry.
Required Textbook:
Required Reading Security in Computing by Charles P. Pfleeger, Prentice-Hall,
Fifth Edition, 2015. The textbook may be available online at:
http://ptgmedia.pearsoncmg.com/images/9780134085043/samplepages/9780134085043.pdf
. Supplemental reading material will also be identified and/or provided during the semester.
Page 1 of 6
02/17/2024
Class Procedure: Class sessions will be a combination of lecture, discussion, and participating in case studies. Students are
responsible for assigned readings and completing all assignments. Students are expected to read the
assigned material prior to class. The material covered in class is designed to clarify and supplement the
text book reading assignments. The Power Point notes used for lecture will be posted in the Blackboard
course website. Grading Policy:
Students will be evaluated on the following basis:
Exams (2)
50% (500 pts.)
Mid-term
25%
Final
25%
5 Case Studies
50% (10% each) (500 pts.)
Total
1000 pts.
Final course grades will abide by the following scale:
Grading Scale
A
93 – 100
A-
90 – 92.99
B+
85-89.99
B
80-84.99
C
70-79.99
F
<70
Case Study Assignments:
Case study assignments will be posted on Blackboard Assignments. Weeks 3, 5, 7, 10, and 12 will be
devoted to researching and completing your case studies. Your case study should include: a statement of
the problem or opportunity, an evaluation of relevant alternative courses of action and recommendations,
and your conclusion on which alternative(s) you chose and why.
Do not summarize or review the material in the case study - you are required to analyze the case study
and present your recommendations. The case study must be written as a consultant or employee making
recommendations to senior management (primarily the Chief Information Officer (CEO) or the Chief
Information Security Officer (CISO)).
The case study write-up will be 4-5 pages in length, 1.5-spacing. Your case study submissions will be
graded based on your analysis of the problem, for content, and for exposition (coherence,
understandability, grammar, and spelling), for a total of 100 points. Case study papers must be submitted
on time.
Mid-term and Final Exams: Both exams will be administered online via Blackboard. The exams are open book, and Internet and
documents posted on Blackboard can be used. The exam format will be essay-type questions, and mini-
case studies based on technologies presented in class, and the concepts, approaches, and security control
measures in the readings. You will be tested on your ability to analyze and apply the technologies and
methodologies covered in readings and in class. Make-up tests will be offered, in exceptional situations, in accordance with applicable University policy,
and in the absence of policy, at the discretion of the professor. (Prior arrangements or letters from
employers or health care providers are required for last-minute requests for make-up exams.)
Page 2 of 6
02/17/2024
Professionalism: All materials submitted for this course should look professional including the use of
correct grammar and spelling. Please ensure all cell phones and other devices that could potentially
disrupt the class are turned off upon entering the classroom. Late Submission Policy: All assigned work (i.e., assignments and projects) is expected to be completed
and submitted by the stated deadline. No late work will be accepted
and a grade of zero (0) will be given.
Students are encouraged to discuss homework and projects as a means to share knowledge, experience
and lessons learned as part of the learning process, but academic honesty should be strictly observed (see
below). Attendance Policy:
Students are expected to attend all classes (in-person or virtually via Zoom) in order
to remain current in the coursework. It is the student’s responsibility to remain current on the assignments
and course material if class is missed. The instructor will allow only students with documented excuses
(see below) to make up missed work or assignments when it is feasible
. If the student is absent from an
exam during the scheduled time for that exam, the student will automatically receive a grade of zero (0)
for the exam unless: (a) the student notifies the instructor of the absence prior to the exam and is approved
for the absence by the instructor; (b) the student is ill and supplies a written doctor’s excuse explaining
the absence; or (c) there is an extraordinary situation which the instructor allows as an acceptable excuse.
Only under one of these circumstances will arrangements for a makeup exam be made.
Posting of Grades:
University policy prohibits posting of grades in any form. The instructor will not
report grades via email or in response to phone calls. Grades for the semester can be accessed online. Cheating and Plagiarism:
Academic honesty is strongly observed. This course may consist of both
individual and team assignments. A team project is an assignment in which collaboration is allowed and
highly encouraged. However, the work of the team must
be of the team’s creation and not plagiarized
from other sources. Individual assignments must
reflect the work of the individual student and of his/her
creation. While studying together, discussion and collaboration is encouraged, individual assignments
must be individually prepared
– copying or sharing files, diagrams and/or code is considered cheating.
The penalty for cheating will, at a minimum, consist of a grade of zero for the dishonest work and may
lead to the possibility of course failure depending on the severity. Students are responsible for reading and
knowing Towson University’s Student Academic Integrity Policy.
Please review the Academic Integrity
Policy so that you are aware of what steps will be taken in instances of cheating, plagiarism, etc. Students
always have the right of appeal, and should be aware of this. Please note that it is important for faculty to
record observations and actions taken. If a faculty member wishes to impose penalties, it is
recommended that he or she first advise the students of the decision before imposing a final penalty. This
gives the student an opportunity to question the decision and to be heard. If a cheating incident should
occur, faculty is urged to inform the students involved in writing of the penalty to be imposed, with a
copy to the Office of Judicial Affairs. By this method, it may be determined whether or not the student
incident is an isolated one.
Classroom Policy:
If you have a learning disability and/or need accommodation for any reasons, please
advise the instructor as early as possible in the course.
Repeat Policy:
Students may not repeat a course more than once without prior permission of the
Academic Standards Committee. Dropping this course: March 29th:
Last day to drop a course with no grade.
Withdraw from course: April 8
th
:
Last day to withdraw from course with a grade of “W.”
Page 3 of 6
02/17/2024
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Class Schedule - Subject to change
#
Date
Topics for Discussion
Readings / Supplementary Readings
1
1/31/24
Class Orientation
Introductions
Course overview and introduction, review of syllabus and readings, assignments
Case Study – Format, Expectations, Some Pointers
Introduction to IT Security
IT Security Principles
Best Security Practices
Impact of Risk
Understanding concept of Confidentiality, Integrity, and Availability
Read Class Syllabus and Schedule Read Security in Computing, Chapter 1 (Required)
Review the US Cybercrime report posted on Blackboard Documents – 2018 and 2020 US State of Cybercrime Survey Review Synopsys 2022 Risk Analysis Report
Hacker/Social Engineering Video https
://
www
.
youtube
.com/watch?v=
bo
-M6XV2
uXs
Video recording:
https://towsonu.hosted.panopto.com/Panopto/Pages/Viewer.aspx?
id=442fc884-44bf-4d32-a9bd-ab5301530c31
2
2/7/24
Risk Management
Overview of Threat and Vulnerabilities
Methodology for conducting risk
General Security Risk Assessment Guideline
Read Security in Computing, Chapter 3, Sections 3.2 and 3.3, Chapter 6, Section 6.2, and Chapter 10, Section 10.4 (Required)
Read GAO Report on Information Security Risk Assessment – Practices of Leading Organizations
(See supplemental readings in Blackboard – Course Documents)
Review Assignments in Blackboard Video recording:
https://towsonu.hosted.panopto.com/Panopto/Pages/Viewer.aspx?
id=9733b25f-4dc7-4558-b32f-ab5900086c56
3
2/14/24
Case Study 1 – See Blackboard Assignments
4
2/21/24
IT Security Control Measures
Overview of Administrative Security
FISMA, NIST SP 800-53,
GAISA V3.0, HIPAA
Sarbanes Oxley
Industry Security Controls
Sarbanes Oxley, Section 404 IT Compliance
GAISP V3.0
Health Care Security Controls (HIPAA)
Title I Health Care Access, Portability, and Renewability
Title II Preventing Health Read Security in Computing, Chapter 1, Section 1.5
Review NIST SP 800-53 Rev 5, Chapters 2 and 3, Appendix C
Read supplemental readings on SOX, HIPAA, and security guidelines (See supplemental readings in Blackboard - Course Documents). Note, there are several documents. These documents will be used to assist in completing the case study.
Review Federal Information Security Management Act of 2002
http://en.wikipedia.org/wiki/
Federal_Information_Security_Management_Act_of_2002
Video recording:
https://towsonu.hosted.panopto.com/Panopto/Pages/Viewer.aspx?
id=ee0ac3dd-8844-4874-b701-ab67000884ad
Page 4 of 6
02/17/2024
Care Fraud and Abuse
5
2/28/24
Case Study 2 – See Blackboard Assignments
6
3/6/24
Security in Networks
Firewalls
Virtual Private Networks
Intrusion Detection Systems
Access Control, I&A, and Biometrics
Read Security in Computing, Chapter 6, Sections 6.6, 6.7 and 6.8 (Required)
Review Commercial Firewall Security Target, Blackboard Documents
Read Security in Computing, Chapter 2, Sections 2.1 and 2.2 (Required)
Video recording:
https://towsonu.hosted.panopto.com/Panopto/Pages/Viewer.aspx?
id=27b221a3-5365-4700-b818-ab7500090125
Mid-term Exam Review
7
3/13/24
Case Study 3 – See Blackboard Assignments
3/20/24
Spring Break
8
3/27/24
Mid-term Exam The mid-term exam will be posted on Blackboard from 6:00 pm on 3/27 until 3/30 at 6:00 pm. The completed exam must be submitted via Black Board by 6:00 pm on 3/30.
9
4/3/24
Cryptography and PKI
Symmetric and Asymmetric Key Encryption
Public Key Infrastructure Technology
Certification Practice Statements
Export Encryption Policy
Read Security in Computing, Chapter 2, Section 2.3, and Chapter 12, Sections 12.2, 12.3, 12.4, and 12.5 (Required)
Review Verisign Certification Practice Statement, Version 3.4, Blackboard Documents Video recording:
https://towsonu.hosted.panopto.com/Panopto/Pages/Viewer.aspx?
id=da3c78c8-9dc6-4b81-907c-aa1d0183c43b
10
4/10/24
Case Study 4 – See Blackboard Assignments
11
4/17/24
Incident Response,
Symmetric and Asymmetric Key Encryption, Public Key Infrastructure Technology
Forensics
COOP
Cyber Incident Response Read Security in Computing, Chapter 6 (Sections 6.2, 6.3, 6.4)
Read Security in Computing, Chapter 10, Sections 10.2 and 10.3, and 10.5 (Required)
Read Security in Computing, Chapter 6, Section 6.3 (Required)
Video recording:
https://towsonu.hosted.panopto.com/Panopto/Pages/Viewer.aspx?
id=683b6ad5-ac65-4d12-96fa-aafe000a34aa
12
4/24/24
Case Study 5 – See Blackboard Assignments
13
5/1/24
Wireless Security
Security protocols
Read NIST SP 800-48, Wireless Network Security.
Page 5 of 6
02/17/2024
Wireless attacks methods
Vulnerabilities
Review this website:
http://en.wikipedia.org/wiki/Wireless_security
Video recording:
https://towsonu.hosted.panopto.com/Panopto/Pages/Viewer.aspx?
id=683b6ad5-ac65-4d12-96fa-aafe000a34aa
14
5/8/24
Privacy and Legal Issues
Anonymity
Encryption
Children’s Privacy
Financial
First Amendment
International
Medical
Online
Workplace
Read Security in Computing
, Chapter 6, Section 6.3 (Required)
Read Security in Computing, Chapters 9 and 11 (Required)
Video recording 1 (Privacy and Legal Issues, and Final Exam Review):
https://towsonu.hosted.panopto.com/Panopto/Pages/Viewer.aspx?
id=cf49ac29-4613-447b-881d-ab1a0009bf42
15
5/15/24
Final Exam The final exam will be posted on Blackboard from 6:00 pm on 5/15 until 5/18 at 6:00 pm. The completed exam must be submitted via Blackboard by 5/18 at 6:00 pm.
Page 6 of 6
02/17/2024
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help