Information Security includes an evaluation of the techniques, policies and strategies to ensure that data stored in an organization's computers cannot be accessed or processed without the consent of the organization. Also included, is an analysis of Information Security & Risk Management, Access Control, Physical Security, Security Architecture & Design, Business Continuity & Disaster Recovery Planning, Telecommunications & Network Security, Application Security, Operations Security, Law, Compliance & Investigations. This course also reviews the building blocks of information systems and cryptography is provided to reinforce the scope of security management.
The grading will be based on essay assignments, Forum postings, and research paper
There will be six essay assignments. The assignments and exercise will count as 30% of the final grade. The homework assignments will follow each of the major portions of the course. These assignments will be problems or questions from the text. They are selected to provide the student with information to understand the concepts discussed. Assignments should be prepared in Microsoft Word or an equivalent word processor program and uploaded into the student folder by the due date.
There will be 8 Forum postings you will need to respond to. Answers should be a paragraph with a topic sentence that restates the question and supporting sentences using the terms, concepts, and theories from the required readings. Each answer should be a minimum of 250 words (about 6 or 7 sentences) with APA format citations. You may attack, support or supplement other students’ answers using the terms, concepts and theories from the required readings. All responses should be a courteous paragraph that contains a topic sentence with good supporting sentences. You may respond multiple times with a continuous discussion with points and counter points. The key requirement is to express your idea and then support your positionusing the terms, concepts and theories from the required readings to demonstrate to me that you understand the material. The Forum postings will count as 30% of the final grade.
REFERENCE ONLY- Information Security Fundamentals, 2nd edition-This text will be REQUIRED in ISSC661 and ISSC680. This text will be used as a reference only for the other courses in the ISSC program. - eBook available in the APUS Online Library
Thomas R. Peltier
Information Security: Design, Implementation, Measurement & Compliance - eBook available in the APUS Online Library
American Public University System, 111 W. Congress Street, Charles Town, WV 25414 | Toll Free: 877-755-2787
American Public University System (APUS) is accredited by the Higher Learning Commission (HLC) and is a wholly owned subsidiary of American Public Education, Inc. (APEI). Pursuant to a contractual arrangement, APEI provides certain services for the benefit of APUS, subject to APUS oversight and ultimate authority. Pursuant to a license, APEI may use APUS’s trademarks and other intellectual property in its performance of those services. American Public University System, American Public University, and American Military University are not affiliated with American University or the U.S. Military.