CIT 181 - Principles of Information Security Credits: 4 4 Lecture Hours
Prerequisites: CIT 115 or waived with instructor approval.
Description This course provides students necessary background in the technical realities and legal and theoretical principles of computer and information security to help them identify and evaluate computer security crimes and incidents. Topics include information security components and models, legal and ethical issues in information security and privacy, basics of computer networks and data communication, common computer and network system threats, attacks, and vulnerabilities, as well as information security risk and damage analysis and assessment. Learning Outcomes Upon successful completion of the course, the student will:
- Define information security and describe major information security models.
- Discuss needs for information security and procedures of information security auditing.
- Identify major national and international laws that protect privacy and information security.
- Discuss legal, ethical and financial ramifications of information security violations.
- Explain the basic concepts of IP addressing and the TCP/IP protocol.
- Analyze network traffic and configure various Internet security settings.
- Identify and describe common computer and network threats, attacks and vulnerabilities.
- Evaluate the strengths and weaknesses of current information security solutions.
- Analyze and assess the risks and damage of business information systems.
- Develop information security policies or plans that address potential crimes or incidents.
Listed Topics
- Information security models and components
- Information technology laws and ethics
- Business needs and customer privacy
- Impact of the Sarbanes-Oxley Act
- IP addressing and TCP/IP model, layers, protocols, and functions
- Network sniffing and data analysis
- Operating system and Internet security threats, attacks, and vulnerabilities
- Strengths and weaknesses of IDS and firewalls
- Information security risk management and damage assessment
- Information security policies and planning
Reference Materials Selected textbooks, references, and industry-standard hardware and software tools will be used. Approved By: Johnson, Alex Date Approved: 05/03/2006 Last Reviewed: 11/11/2022
Course and Section Search
Add to Portfolio (opens a new window)
|