The course will focus on security policies that can be used to help protect and maintain a network, such as password policy, e-mail policy and Internet policy. Topics also include organizational behavior and crisis management. (3 credits)
- ITE 145: Fundamentals of Information Systems Security
Student Learning Outcomes (SLOs)
Students who successfully complete this course will be able to:
- Identify the role of an information systems security (ISS) policy framework in overcoming business challenges.
- Recognize the relationship between business drivers and information systems security policies.
- Understand the relationship between regulatory compliance requirements and information system security policies.
- Explain how security policies help mitigate risks and support business processes in various domains of a typical IT infrastructure.
- Explain issues related to security policy implementations and the keys to success.
- Describe the components and basic requirements for creating a security policy framework.
- Describe how to design, organize, implement, and maintain IT security policies.
- Describe the different methods, roles, responsibilities, and accountabilities of personnel, along with the governance and compliance of a security policy framework.
- Describe the different ISS policies associated with the user domain.
- Describe the different ISS policies associated with the IT infrastructure.
- Describe the different ISS policies associated with risk management.
- Describe the different ISS policies associated with incident response teams (IRTs).
- Describe issues related to implementing ISS policies.
- Describe issues related to enforcing ISS policies.
- Describe the different issues related to defining, tracking, monitoring, reporting, automating, and organizing compliance systems and emerging technologies.
General Education Outcomes (GEOs)
Course Activities and Grading
Available through Charter Oak State College's online bookstore
- Johnson, Robert and Chuck Easttom (2022). Security Policies and Implementation Issues. 3rd Edition. Burlington, MA: Jones & Bartlett. ISBN-13: 9781284199840
- Note: This is a bundle which includes the textbook and the Access Code required for this course. We discourage students from purchasing “used” materials from other sources due to access codes not working properly.
Readings and Exercises
Topic: Information Systems Security Policy Management and Business Drivers
Topics: Compliance Laws and Business Challenges
Topics: IT Security Policy Implementation Issues and Frameworks
Topics: Managing IT Security Policies, and Policy Framework Approaches
Topics: User Domain and IT Infrastructure Security Policies
Topics: Data Classification and Handling and Incident Response Team Policies
Topics: IT Security Policy Implementation and Enforcement, Compliance Systems and Emerging Technologies
Topics: IT Policy Compliance and Compliance Technologies, Course Review and Final Exam
COSC Accessibility Statement
Charter Oak State College encourages students with disabilities, including non-visible disabilities such as chronic diseases, learning disabilities, head injury, attention deficit/hyperactive disorder, or psychiatric disabilities, to discuss appropriate accommodations with the Office of Accessibility Services at OAS@charteroak.edu.
COSC Policies, Course Policies, Academic Support Services and Resources
Students are responsible for knowing all Charter Oak State College (COSC) institutional policies, course-specific policies, procedures, and available academic support services and resources. Please see COSC Policies for COSC institutional policies, and see also specific policies related to this course. See COSC Resources for information regarding available academic support services and resources.