This course will focus on an overview of security challenges and strategies of countermeasure in the information systems environment. Topics include definition of terms, concepts, elements, and goals incorporating industry standards and practices with a focus on availability, vulnerability, integrity and confidentiality aspects of information systems. (3 credits)
- ITE 101: Management Information Systems or ITE 102: Introduction to Computer Science
Student Learning Outcomes (SLOs)
Upon completion of the course, the students will be able to:
- Explain the concepts of information systems security as applied to an IT infrastructure.
- Describe how malicious attacks, threats, and vulnerabilities impact an IT infrastructure.
- Explain the role of access controls in implementing a security policy.
- Explain the role of operations and administration in effective implementation of security policy.
- Explain the importance of security audits, testing, and monitoring to effective security policy.
- Describe the principles of risk management, common response techniques, and issues related to recovery of IT systems.
- Explain how businesses apply cryptography in maintaining information security.
- Analyze the importance of network principles and architecture to security operations.
- Explain the means attackers use to compromise systems and networks and defenses used by organizations.
- Apply international and domestic information security standards and compliance laws to real-world implementation in both the private and public sector.
General Education Outcomes (GEOs)
Course Activities and Grading
Discussions (Weeks 1-8)
Written Assignments (Weeks 1-7)
Labs (Weeks 1-7)
Projects (Weeks 2, 6 & 8)
Final Exam (Week 8)
Available through Charter Oak's online bookstore
- Kim, David, and Michael G. Solomon. Fundamentals of Information Systems Security - with Navigate2 Access. 3rd ed. Sudbury, MA: Jones & Bartlett, 2018. ISBN-13: 978-1-284-15971-4
Note: This is a bundle which includes the textbook and an access code required for this course. Student must purchase these materials “New” from the Charter Oak State College bookstore. Used materials or materials from any other source are not acceptable.
- Links and readings will be provided in the Course Documents and Webliography sections on Blackboard.
- See below for additional requirements
|Week||SLOs||Readings and Exercises||Assignments|
Topic: Information Systems Security Fundamentals
Topic: Security Countermeasures to Mitigate Malicious Attacks
Topic: Access Controls
Topics: Security Policies, Auditing, Testing, and Monitoring
Topics: Risk, Response, Recovery, and Cryptography
Topics: Network Weaknesses and Mitigation of Risks and Threats from Attacks
Topics: Information Security Standards and Compliance Laws
Topics: Information Systems Security Education and Certifications
Hatsize System Requirements
- Bandwidth: At least .8 Mbps per second
- Latency: Less than 125 milliseconds
Minimum System Requirements
- N/A – all requirements are network and browser-based
- Any contemporary browser that supports HTML 5 classes
- Chrome and Firefox are recommended
COSC Accessibility Statement
Charter Oak State College encourages students with disabilities, including non-visible disabilities such as chronic diseases, learning disabilities, head injury, attention deficit/hyperactive disorder, or psychiatric disabilities, to discuss appropriate accommodations with the Office of Accessibility Services at OAS@charteroak.edu.
COSC Policies, Course Policies, Academic Support Services and Resources
Students are responsible for knowing all Charter Oak State College (COSC) institutional policies, course-specific policies, procedures, and available academic support services and resources. Please see COSC Policies for COSC institutional policies, and see also specific policies related to this course. See COSC Resources for information regarding available academic support services and resources.