Introduction to Information Security, The Need for Security, Legal, Ethical, and Professional Issues in Information Security, Risk Management, Planning for Security, Security Technology, Cryptography, Physical Security, Implementing Information Security, Security and Personnel, Information Security Maintenance.
ECE322 Networking and Data Communications
This course provides the foundation for understanding the key issues associated with protecting information assets, determining the levels of protection and response to security incidents, and designing a consistent, reasonable information security system, with appropriate intrusion detection and reporting features. The purpose of the course is to provide the student with an overview of the field of information security and assurance. Students will be exposed to the spectrum of security activities, methods, methodologies, and procedures. Coverage will include inspection and protection of information assets, detection of and reaction to threats to information assets, and examination of pre- and post-incident procedures, technical and managerial responses, and an overview of the information security planning and staffing functions.
The tentative point distribution is as follows.
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 4th Edition. Course Technology, Cengage Learning, 2012
|1||Information Security: An Introduction [Slides]||Chapter 1|
|2||Why Security is Needed [Slides]||Chapter 2|
|3||Professional, Legal, and Ethical Issues in Information Security [Slides]||Chapter 3|
|4||Managing IT Risk [Slides]||Chapter 4|
|5||How to Plan for Security [Slides]||Chapter 5|
|6||Security Technology: Wireless, VPNs, and Firewalls [Slides]||Chapter 6|
|9||Security Technology: Prevention Systems, Intrusion Detection, and Other Security Tools [Slides]||Chapter 7|
|10||Using Encryption [Slides]||Chapter 8|
|11||Securing Physical Assets [Slides]||Chapter 9|
|12||Implementing Information Security [Slides]||Chapter 10|
|13||Personnel and Security [Slides]||Chapter 11|
|14||Maintenance of Information Security and eDiscovery [Slides]||Chapter 12|
|15||Review of the Semester||16||Final Exam|
Updated: Dec. 6, 2013