Nov 23, 2024  
2019-2020 Catalog 
    
2019-2020 Catalog [ARCHIVED CATALOG]

Add to Portfolio (opens a new window)

CIT 181 - Principles of Information Security


Credits: 4
4 Lecture Hours

Prerequisites: CIT 115  or waived with instructor approval.

 
Description
This course provides students necessary background in the technical realities and legal and theoretical principles of computer and information security to help them identify and evaluate computer security crimes and incidents. Topics include information security components and models, legal and ethical issues in information security and privacy, basics of computer networks and data communication, common computer and network system threats, attacks, and vulnerabilities, as well as information security risk and damage analysis and assessment.


Learning Outcomes
Upon successful completion of the course, the student will:

  1. Define information security and describe major information security models.
  2. Discuss needs for information security and procedures of information security auditing.
  3. Identify major national and international laws that protect privacy and information security.
  4. Discuss legal, ethical and financial ramifications of information security violations.
  5. Explain the basic concepts of IP addressing and the TCP/IP protocol.
  6. Analyze network traffic and configure various Internet security settings.
  7. Identify and describe common computer and network threats, attacks and vulnerabilities.
  8. Evaluate the strengths and weaknesses of current information security solutions.
  9. Analyze and assess the risks and damage of business information systems.
  10. Develop information security policies or plans that address potential crimes or incidents.
Listed Topics
  1. Information security models and components
  2. Information technology laws and ethics
  3. Business needs and customer privacy
  4. Impact of the Sarbanes-Oxley Act
  5. IP addressing and TCP/IP model, layers, protocols, and functions
  6. Network sniffing and data analysis
  7. Operating system and Internet security threats, attacks, and vulnerabilities
  8. Strengths and weaknesses of IDS and firewalls
  9. Information security risk management and damage assessment
  10. Information security policies and planning
Reference Materials
Selected textbooks, references, and industry-standard hardware and software tools will be used.
Approved By: Johnson, Alex Date Approved: 05/03/2006


Course and Section Search




Add to Portfolio (opens a new window)