CIS1906 PRINCIPLES OF INFORMATION ASSURANCE
3 Credit Hours
This course is open to students on the college level in either the freshman or sophomore year.
CIS1906 - Principles of Information Assurance (3 hrs.)
An Introduction to the general concepts of security issues and implementation of security within an organization.
This course is designed to meet the needs of students in explaining the various issues in computer security including protection, identification and implementation of security procedures and software
Upon completion of the course, the student will gain an understanding of basic security, methods of implementing software and hardware based security. Various techniques involved in cyber attacks will be discussed including protection against these attacks
Unit Outcomes for Criterion Based Evaluation:
The following defines the minimum core content not including the final examination period. Instructors may add other content as time allows.
UNIT 1: Introduction to Information Security
Outcomes: Understand the basic definitions of information security
- List the history of information security
- Explain what is meant by security
- Explain the critical characteristics of information
- Explain the idea of the NSTISSC Security Model
- List the components of an information system
- Explain what is meant by securing components
- Explain balancing information security and access
- List the approaches to information Security Implementation
- Explain the Systems Development Life Cycle and the Security Systems Development Life Cycle
UNIT 2: The Need for Security
Outcomes: Understand the need for security including types of threats
- Explain business needs
- List and Explain the different threats
- List and Explain the various forms of computer attacks
- Explain the need for secure software development
UNIT 3: Legal, Ethical, and Professional Issues in Information Security
Outcomes: Understand the various legal, ethical and professional topics involved in securing a computer system.
- Explain how laws and ethics interact in information security
- List relevant U.S. laws
- List international laws and legal bodies
- Explain ethics and information security
- Explain codes of ethics and professional organizations
UNIT 4: Risk Management
Outcomes: Understand the various topics in risk management including identification, assessment, and control
- Explain what is risk management
- Explain what is risk identification
- Explain what is risk assessment
- List and Explain risk control strategies
- Explain how to select a risk control strategy
- Explain quantitative versus qualitative risk control practices
- Explain risk management discussion points
- List recommended risk control practices
UNIT 5: Planning for Security
Outcomes: Understand how to design a plan for implementing security
- Explain information security policy, standards, and practices
- Explain the information Security Blueprint
- Explain security education, training and awareness program
- Explain continuity strategies
UNIT 8: Cryptography
Outcomes: Understand the needs for cryptography and how to implement it.
- Explain the foundations of Cryptology
- Explain and calculate various cipher methods
- Explain various cryptographic algorithms
- Explain and use various cryptographic tools
- List Protocols for Secure Communications
- List and Explain Attacks on Cryptosystems
UNIT 9: Physical Security
Outcomes: Understand the physical considerations in implementing security.
- List physical access controls
- Explain fire security and safety
- Explain failure of supporting utilities and structural collapse
- Explain Interception of Data
- List and Explain Mobile and Portable Systems
UNIT 10: Implementing Information Security
Outcomes: Understand the issues that come up in actual implementation.
- Explain information security project management
- Explain implementation topics
- Explain nontechnical aspects of implementation
- Explain systems security certification and accreditation
UNIT 11: Security and Personnel
Outcomes: Understand the need for policies in dealing with personnel
- Explain positioning and staffing the security function
- List and Explain credentials of information security professionals
- Explain employment policies and practices
- Explain security considerations for nonemployees
- List and Explain interval control strategies
- Explain privacy and the security of personnel data
UNIT 12: Information Security Maintenance
Outcomes: Understand how to continually maintain your system you have implemented
- List and Explain security management models
- Explain the Maintenance Model
- Explain the need for digital forensics
- Use various digital forensics tools
Contact Bookstore for current textbook.
Student will need to have the ability to install various software packages.
Students should adhere to the attendance policy outlined by the instructor in the course syllabus.
The grading policy will be outlined by the instructor in the course syllabus.
Maximum class size:
Based on classroom occupancy
Course Time Frame:
The U.S. Department of Education, Higher Learning Commission and the Kansas Board of Regents define credit hour and have specific regulations that the college must follow when developing, teaching and assessing the educational aspects of the college. A credit hour is an amount of work represented in intended learning outcomes and verified by evidence of student achievement that is an institutionally-established equivalency that reasonably approximates not less than one hour of classroom or direct faculty instruction and a minimum of two hours of out-of-class student work for approximately fifteen weeks for one semester hour of credit or an equivalent amount of work over a different amount of time, The number of semester hours of credit allowed for each distance education or blended hybrid courses shall be assigned by the college based on the amount of time needed to achieve the same course outcomes in a purely face-to-face format.
Refer to the following policies:
402.00 Academic Code of Conduct
263.00 Student Appeal of Course Grades
403.00 Student Code of Conduct
Disability Services Program:
Cowley College, in recognition of state and federal laws, will accommodate a student with a documented disability. If a student has a disability, which may impact work in this class, which requires accommodations, contact the Disability Services Coordinator.