Course Content
1. Introduction to Information Security 2. Information Risk Management & Analysis 3. Security planning, management and policy 4. Role Based Access Control Systems 5. Network Security 6. Digital Security 7. Security Law, Investigation and ethical issues 8. Security Audits and Standards - BS7779 and ISO27000 9. Disaster Recovery & Business Continuity Plan 10. Physical Security
Tentative Session Plan
Class Participation and Case Study Discussions – 10% Term Paper & Presentation – 20% Mid Term Exam - 30% Final Exam – 40%
Case Study
Objectives of Case Analysis:
1. To identify major issues/problem(s) 2. Examine facts and evaluate evidences 3. Apply knowledge / experience / understanding gained in the class to analyze and take necessary actions and consider feasibility of alternative courses of action 4. Steps for implementation
Each individual will be responsible for coming up with a one-page typed problem statement and answers addressing above objectives. You are free to discuss among your team members but no duplication is allowed.
References
1. Principles of Information Security – Michael E Whitman and Herbert J Mattord, Cengage Learning publications 2. Introduction to Cryptography - Principles and applications. Delfs, H. and H. Knebl. Springer-Verlag. 2002 3. Design of robust business-to-business electronic marketplaces with guaranteed privacy: J, Kalvenes, A.Basu, Management Science, Vol. 52, no. 11, pp. 1721-1736 Created By: Debasis Mohanty on 03/26/2014 at 08:57 AM Category: BM-II Doctype: Document