Skip Navigation
 

Course Details

 

Course Details

Course Code: ISSC422 Course ID: 3183 Credit Hours: 3 Level: Undergraduate

This course allows students to examine a broad range of computer security issues and provides the student with technical knowledge not normally addressed in traditional training. It explores the protection of proprietary information and security planning with an emphasis on networked computer vulnerabilities. It also focuses on detection (e.g. viruses, hackers, types of computer crime, computer forensic examination, etc.), as well as disaster recovery and technology law. A primary focus is put on security of systems and computer crime prevention. Also addressed is the maturing criminal population with increased computer literacy, whose tendency is to move from violent actions to more profitable computer crime. Finally, issues of privacy and freedom of information are examined. This course meets the topical requirements of the DoD Directive 8570.1M Information Assurance Management (IAM) Technical II and Management I categories. Requires CITRIX CLIENT SOFTWARE INSTALLATION FOR ONLINE VIRTUAL LABS accessibility.

Course Schedule

Registration Dates Course Dates Start Month Session Weeks
03/29/2022 - 09/02/2022 09/05/2022 - 10/30/2022 September Summer 2022 Session D 8 Week session
04/26/2022 - 09/30/2022 10/03/2022 - 11/27/2022 October Fall 2022 Session B 8 Week session
05/21/2022 - 11/04/2022 11/07/2022 - 01/01/2023 November Fall 2022 Session I 8 Week session
06/28/2022 - 12/02/2022 12/05/2022 - 01/29/2023 December Fall 2022 Session D 8 Week session
07/25/2022 - 12/30/2022 01/02/2023 - 02/26/2023 January Winter 2023 Session B 8 Week session

Current Syllabi

After you have completed this course, you should be able to:

CO1: Identify and prioritize information assets.

CO2: Identify and prioritize threats to information assets.

CO3: Define an information security strategy and architecture.

CO4: Plan for and respond to intruders in an information system

CO5: Describe legal and public relations implications of security and privacy issues.

CO6: Present a disaster recovery plan for recovery of information assets after an incident.

For the purposes of this course, a “week” is defined as the time period between Monday–Sunday, for all Weeks 1 to 8. The first week begins on the first day of the semester and ends on midnight the following Sunday.

Contact: Contact between students and faculty can occur in a number of ways: phone, fax, and electronic communications (Internet) are three examples. Students are expected to maintain routine contact with faculty throughout the course. And while the number of these may vary according to the specific course and individual student need, the University requires at least four contacts during the semester. While these contacts will not be graded (unless indicated below) students should be aware that they count toward the total of required course exercises. EMAIL/class message CONTACT IS ALWAYS ACCEPTABLE IN THIS CLASS!

EMAILS: When you contact me via email, please ensure you put the title of the course (ISSC422) and the current session you are in in the subject line.

Per school policy, all matters concerning the class should be with the “messages: function within the class. This will help me align your email within the right course so I can quickly address any questions you may have, or resolve any problems that may come up.

Grades in this course are based on the following:

  1. Lab assignments: You will have four lab assignments throughout the session, worth a combined total of 20% toward your final grade (5% each).
  2. Forum Postings: I will be posting Forum topics related to Information Security throughout the class session. These postings will be directly tied to our assignments section for grading. These postings are worth a total of 52% for weeks 1-8. Discussion items will be posted within the Forum area of the classroom. Your responses will clearly show whether you are up to date on your readings, so be sure to keep up with course work and respond based upon same. Opinions are always welcome…however; postings providing only opinions will be graded accordingly. Your grades for Forum postings are available throughout the semester as they are graded throughout the week. Please ensure you understand the Rubric grading matrix in the next page to guide your response and posting. I will be using this matrix to assign grades for your Forum postings.
  3. Concept Paper: Worth 15% of your final grade. The content for the project paper is listed under the Week 4 of your syllabus

In week 4 for students will write a concept paper to support their reasoning for choosing their topic for their final project in week 7. In other words, in week 4 you are going tell the reader (the instructor) why you think your topic for your final project is worth doing. You are going to justify this as a proposal.

The topic for your week 4 concept paper will be the same as your final project; they are linked together. The week 4 concept paper justifies the writing of your final project.

Here are the Week 4 requirements and topics that you may choose from:

Submit a 3 page concept paper (coversheet, introduction and reference page do not count) IAW APA format on an approved topic (see pre-approved topics in the syllabus). Paper organization will include (use as headings):

Requirements:

• Coversheet

• Introduction.

• Problem Statement.

• Relevance and Significance.

• References (at least five).

Pre-approved research topics:

• Authentication/Digital signatures

• Data collections tools (hardware & software)

• E-business/e-commerce security

• End user security issues.

• Government vs. commercial organization security issues.

• HIPAA

• Identity Theft

• ID&IH Management and Legal Issues

• Instant Messaging security.

• Intrusion detection.

• Sarbannes Oxley

• Security Threats & Vulnerabilities

• Wireless technology security

You may also choose a topic not listed but do check for approval. Students should choose a topic that interests them and they would like to learn more about.

Project/Research Paper: There will be one individual project paper throughout the session, worth 15%. The content for the project paper is listed under the Week 7 of your syllabus.

Using the chosen topic for their Week 4 concept paper, students will develop a final

Project Paper: (Due by Sunday of Week 7 11:55 PM EST)

1. Submit a 10 page research paper (cover sheet, introduction and reference page do not count) with APA standard annotations on an approved topic (see pre-approved topics below).

2. Some pre-approved research topics

• Authentication/Digital signatures

• Data collections tools (hardware & software)

• E-business/e-commerce security

• End user security issues.

• Government vs. commercial organization security issues.

• HIPAA

• Identity Theft

• ID&IH Management and Legal Issues

• Instant Messaging security.

• Intrusion detection.

• Sarbannes Oxley

• Security Threats & Vulnerabilities

• Wireless technology security

You may use resources from the APUS Online Library, any library, government library, or any peer-reviewed reference (Wikipedia and other non-peer-reviewed sources are not acceptable). The paper must be at least 10 pages double-spaced, 1" margin all around, black12 point fonts (Times New Roman, Arial, or Courier) with correct APA formatted citations. Graphics are allowed but do not apply for the minimum page count. A minimum of 10 references are needed. The paper may be subjected to Turnitin against plagiarism.

You must complete each and every one of the assignments, regardless of how well you do on the other assignments. This includes all requirements for book reports, theme papers, term papers, and any other type of evaluation the professor has assigned. Failure to complete all assignments may result in an “F”.

Evaluation Technique

The grading scale used in this course is the standard grading scale used by AMU. Grades are based on a 4.0 scale as follows:

Grading Scale

Please see the student handbook to reference the University’s grading scale.

NameGrade %
Forums 25.00 %
Week 1 Forum 3.13 %
Week 2 Forum 3.13 %
Week 3 Forum 3.13 %
Week 4 Forum 3.13 %
Week 5 Forum 3.13 %
Week 6 Forum 3.13 %
Week 7 Forum 3.13 %
Week 8 Forum 3.13 %
Exercises 30.00 %
Week 4 Concept Paper 15.00 %
Week 7 Project Paper 15.00 %
Labs 20.00 %
Week 1 Lab 2.50 %
Week 2 Lab 2.50 %
Week 3 Lab 2.50 %
Week 4 Lab 2.50 %
Week 5 Lab 2.50 %
Week 6 Lab 2.50 %
Week 7 Lab 2.50 %
Week 8 Lab 2.50 %
Weekly Quizzes 25.00 %
Week 1 Quiz 3.13 %
Week 2 Quiz 3.13 %
Week 3 Quiz 3.13 %
Week 4 Quiz 3.13 %
Week 5 Quiz 3.13 %
Week 6 Quiz 3.13 %
Week 7 Quiz 3.13 %
Week 8 Quiz 3.13 %

After you have completed this course, you should be able to:

CO1: Identify and prioritize information assets.

CO2: Identify and prioritize threats to information assets.

CO3: Define an information security strategy and architecture.

CO4: Plan for and respond to intruders in an information system

CO5: Describe legal and public relations implications of security and privacy issues.

CO6: Present a disaster recovery plan for recovery of information assets after an incident.

Book Title:ISSC422 virtual lab manual provided inside the classroom
ISBN:NTMO
Publication Info:CLASS-Jones & Bartlett
Electronic Unit Cost:$55.00
 
Book Title:Requires CITRIX CLIENT SOFTWARE INSTALLATION FOR ONLINE VIRTUAL LABS accessibility - instructions provided inside the classroom.
Author: No Author Specified
 
Book Title:Fundamentals of Information Systems Security, 3rd ed. - the VitalSource eBook is provided inside the classroom
ISBN:9781284116458
Publication Info:VS-Jones & Bartlett
Author:Kim
Unit Cost:$99.95
Electronic ISBN:9781284128567
Electronic Unit Cost:$64.97
 

Previous Syllabi

Not current for future courses.