SAMPLE. ITS460: Information Security Legal and Ethical Issues. Course Description and Outcomes. Credit Hours: 3

Similar documents
SAMPLE. PJM410: Assessing and Managing Risk. Course Description and Outcomes. Participation & Attendance. Credit Hours: 3

SAMPLE. ORG423: Communication Strategies for Leaders

Ruggiero, V. R. (2015). The art of thinking: A guide to critical and creative thought (11th ed.). New York, NY: Longman.

MBA 5652, Research Methods Course Syllabus. Course Description. Course Material(s) Course Learning Outcomes. Credits.

MBA6941, Managing Project Teams Course Syllabus. Course Description. Prerequisites. Course Textbook. Course Learning Objectives.

School: Business Course Number: ACCT603 General Accounting and Business Concepts Credit Hours: 3 hours Length of Course: 8 weeks Prerequisite: None

University of Massachusetts Lowell Graduate School of Education Program Evaluation Spring Online

BIODIVERSITY: CAUSES, CONSEQUENCES, AND CONSERVATION

MSE 5301, Interagency Disaster Management Course Syllabus. Course Description. Prerequisites. Course Textbook. Course Learning Objectives

LMIS430: Administration of the School Library Media Center

BSM 2801, Sport Marketing Course Syllabus. Course Description. Course Textbook. Course Learning Outcomes. Credits.

EDU 614: Advanced Educational Psychology Online Course Dr. Jim McDonald

Lyman, M. D. (2011). Criminal investigation: The art and the science (6th ed.). Upper Saddle River, NJ: Prentice Hall.

Course Title: Dealing with Difficult Parents

Adler Graduate School

Monday/Wednesday, 9:00 AM 10:30 AM

MGMT 3362 Human Resource Management Course Syllabus Spring 2016 (Interactive Video) Business Administration 222D (Edinburg Campus)

INTRODUCTION TO GENERAL PSYCHOLOGY (PSYC 1101) ONLINE SYLLABUS. Instructor: April Babb Crisp, M.S., LPC

CRITICAL THINKING AND WRITING: ENG 200H-D01 - Spring 2017 TR 10:45-12:15 p.m., HH 205

PSY 1010, General Psychology Course Syllabus. Course Description. Course etextbook. Course Learning Outcomes. Credits.

Texas A&M University - Central Texas PSYK EDUCATIONAL PSYCHOLOGY INSTRUCTOR AND CONTACT INFORMATION

Cleveland State University Introduction to University Life Course Syllabus Fall ASC 101 Section:

Course Syllabus MFG Modern Manufacturing Techniques I Spring 2017

Valcik, N. A., & Tracy, P. E. (2013). Case studies in disaster response and emergency management. Boca Raton, FL: CRC Press.

SAMPLE. MGT451: Business Policy Development and Implementation

SYLLABUS: RURAL SOCIOLOGY 1500 INTRODUCTION TO RURAL SOCIOLOGY SPRING 2017

Medical Terminology - Mdca 1313 Course Syllabus: Summer 2017

Dowling, P. J., Festing, M., & Engle, A. (2013). International human resource management (6th ed.). Boston, MA: Cengage Learning.

SOCIAL PSYCHOLOGY. This course meets the following university learning outcomes: 1. Demonstrate an integrative knowledge of human and natural worlds

IST 440, Section 004: Technology Integration and Problem-Solving Spring 2017 Mon, Wed, & Fri 12:20-1:10pm Room IST 202

Office Location: LOCATION: BS 217 COURSE REFERENCE NUMBER: 93000

BHA 4053, Financial Management in Health Care Organizations Course Syllabus. Course Description. Course Textbook. Course Learning Outcomes.

ECON492 Senior Capstone Seminar: Cost-Benefit and Local Economic Policy Analysis Fall 2017 Instructor: Dr. Anita Alves Pena

Office Hours: Day Time Location TR 12:00pm - 2:00pm Main Campus Carl DeSantis Building 5136

Content Teaching Methods: Social Studies. Dr. Melinda Butler

MMC 6949 Professional Internship Fall 2016 University of Florida, Online Master of Arts in Mass Communication 3 Credit Hours

Shank, Matthew D. (2009). Sports marketing: A strategic perspective (4th ed.). Upper Saddle River, NJ: Pearson/Prentice Hall.

Course Syllabus Advanced-Intermediate Grammar ESOL 0352

COMM 210 Principals of Public Relations Loyola University Department of Communication. Course Syllabus Spring 2016

Human Development: Life Span Spring 2017 Syllabus Psych 220 (Section 002) M/W 4:00-6:30PM, 120 MARB

STRATEGIC LEADERSHIP PROCESSES

TUCSON CAMPUS SCHOOL OF BUSINESS SYLLABUS

HIST 3300 HISTORIOGRAPHY & METHODS Kristine Wirts

Maintaining Resilience in Teaching: Navigating Common Core and More Online Participant Syllabus

Philosophy in Literature: Italo Calvino (Phil. 331) Fall 2014, M and W 12:00-13:50 p.m.; 103 PETR. Professor Alejandro A. Vallega.

CENTRAL MICHIGAN UNIVERSITY COLLEGE OF EDUCATION AND HUMAN SERVICES

CENTRAL MICHIGAN UNIVERSITY COLLEGE OF EDUCATION AND HUMAN SERVICES Department of Teacher Education and Professional Development

MGMT 479 (Hybrid) Strategic Management

English Policy Statement and Syllabus Fall 2017 MW 10:00 12:00 TT 12:15 1:00 F 9:00 11:00

Academic Integrity RN to BSN Option Student Tutorial

Records and Information Management Spring Semester 2016

BSW Student Performance Review Process

INFO I303 Organizational Informatics

Texas A&M University-Kingsville Department of Language and Literature Summer 2017: English 1302: Rhetoric & Composition I, 3 Credit Hours

ENG 111 Achievement Requirements Fall Semester 2007 MWF 10:30-11: OLSC

The Entrepreneurial Mindset Syllabus

PSYCHOLOGY 353: SOCIAL AND PERSONALITY DEVELOPMENT IN CHILDREN SPRING 2006

GLBL 210: Global Issues

Spring 2015 CRN: Department: English CONTACT INFORMATION: REQUIRED TEXT:

Co-Professors: Cylor Spaulding, Ph.D. & Brigitte Johnson, APR Office Hours: By Appointment

EDIT 576 DL1 (2 credits) Mobile Learning and Applications Fall Semester 2014 August 25 October 12, 2014 Fully Online Course

Course Syllabus p. 1. Introduction to Web Design AVT 217 Spring 2017 TTh 10:30-1:10, 1:30-4:10 Instructor: Shanshan Cui

Greek Life Code of Conduct For NPHC Organizations (This document is an addendum to the Student Code of Conduct)

Bittinger, M. L., Ellenbogen, D. J., & Johnson, B. L. (2012). Prealgebra (6th ed.). Boston, MA: Addison-Wesley.

Introduction to Information System

POFI 1349 Spreadsheets ONLINE COURSE SYLLABUS

Instructor Experience and Qualifications Professor of Business at NDNU; Over twenty-five years of experience in teaching undergraduate students.

HCI 440: Introduction to User-Centered Design Winter Instructor Ugochi Acholonu, Ph.D. College of Computing & Digital Media, DePaul University

SPM 5309: SPORT MARKETING Fall 2017 (SEC. 8695; 3 credits)

Indigenous Thought in Latin American Philosophy (Phil 607) Graduate Seminar Fall 2016, Prof. Alejandro A. Vallega SC 250C, M-W 16:00-17:50

IDS 240 Interdisciplinary Research Methods

EDIT 576 (2 credits) Mobile Learning and Applications Fall Semester 2015 August 31 October 18, 2015 Fully Online Course

Telekooperation Seminar

MMC 6949 Professional Internship Summer 2017 X7135, X72BH, X722A University of Florida, Online Master of Arts in Mass Communication 3 Credit Hours

CS 100: Principles of Computing

Corporate Communication

Coding II: Server side web development, databases and analytics ACAD 276 (4 Units)

Chemistry 106 Chemistry for Health Professions Online Fall 2015

ACADEMIC POLICIES AND PROCEDURES

COURSE DESCRIPTION PREREQUISITE COURSE PURPOSE

AGN 331 Soil Science Lecture & Laboratory Face to Face Version, Spring, 2012 Syllabus

POFI 1301 IN, Computer Applications I (Introductory Office 2010) STUDENT INFORMANTION PLAN Spring 2013

Computer Architecture CSC

Aronson, E., Wilson, T. D., & Akert, R. M. (2010). Social psychology (7th ed.). Upper Saddle River, NJ: Prentice Hall.

National Survey of Student Engagement (NSSE) Temple University 2016 Results

COMMUNICATION AND JOURNALISM Introduction to Communication Spring 2010

BUS 4040, Communication Skills for Leaders Course Syllabus. Course Description. Course Textbook. Course Learning Outcomes. Credits. Academic Integrity

Course Syllabus It is the responsibility of each student to carefully review the course syllabus. The content is subject to revision with notice.

Be aware there will be a makeup date for missed class time on the Thanksgiving holiday. This will be discussed in class. Course Description

TROY UNIVERSITY MASTER OF SCIENCE IN INTERNATIONAL RELATIONS DEGREE PROGRAM

CMST 2060 Public Speaking

International Environmental Policy Spring :374:315:01 Tuesdays, 10:55 am to 1:55 pm, Blake 131

Master Syllabus ENGL 1020 English Composition II

Course Policies and Syllabus BUL3130 The Legal, Ethical, and Social Aspects of Business Syllabus Spring A 2017 ONLINE

Business Computer Applications CGS 1100 Course Syllabus. Course Title: Course / Prefix Number CGS Business Computer Applications

Fullerton College Business/CIS Division CRN CIS 111 Introduction to Information Systems 4 Units Course Syllabus Spring 2016

Course Location: Merrillville Location, Geminus, 8400 Louisiana Street, Merrillville IN Lower Level

Demography and Population Geography with GISc GEH 320/GEP 620 (H81) / PHE 718 / EES80500 Syllabus

Accounting 312: Fundamentals of Managerial Accounting Syllabus Spring Brown

Activities, Exercises, Assignments Copyright 2009 Cem Kaner 1

Transcription:

ITS460: Information Security Legal and Ethical Issues Credit Hours: 3 Contact Hours: This is a 3-credit course, offered in accelerated format. This means that 16 weeks of material is covered in 8 weeks. The exact number of hours per week that you can expect to spend on each course will vary based upon the weekly coursework, as well as your study style and preferences. You should plan to spend 14-20 hours per week in each course reading material, interacting on the discussion boards, writing papers, completing projects, and doing research. Course Description and Outcomes Course Description: In this course students will examine how law, ethics, and technology intersect in organizations that rely on information technology. Students will gain an understanding and insight into issues arising from privacy, secrecy, access control, and policy enforcement, as well as other legal and ethical dilemmas prevalent in today s organizations. Course Overview: ITS460 examines the intersection among law, ethics, and technology in organizations that rely on information technology (IT) or offer IT services. Course readings include a combination of foundational texts and current news articles, which introduce foundational concepts and practical applications concerning security, privacy, law and ethics. Students will gain insight and skills for dealing with issues arising from privacy, secrecy, access control, hacking attacks, network vulnerabilities and policy enforcement as well as other legal and ethical dilemmas prevalent or emerging in today s organizations. Students apply the course concepts to real-world developments and events through a variety of exercises including discussion forums, critical thinking essays and a Portfolio Project. Course Learning Outcomes: 1. Explain the importance of information security to an organization. 2. Describe the risks, threats, and vulnerabilities of security and privacy in IT systems and networks. 3. Explain what is meant by cyber ethics and how this concept may relate to issues of law, policy, and innovation. 4. Analyze how technical and architectural choices may reflect ethical and moral values. 5. Identify the common attacks on IT networks and explain how the motivations behind them have evolved over time. 6. Explain the relationship between security and privacy. 7. Identify and explain some basic approaches to IT security and privacy and how they can be applied in a multinational or international context.

Participation & Attendance Prompt and consistent attendance in your online courses is essential for your success at CSU-Global Campus. Failure to verify your attendance within the first 7 days of this course may result in your withdrawal. If for some reason you would like to drop a course, please contact your advisor. Online classes have deadlines, assignments, and participation requirements just like on-campus classes. Budget your time carefully and keep an open line of communication with your instructor. If you are having technical problems, problems with your assignments, or other problems that are impeding your progress, let your instructor know as soon as possible. Course Materials Textbook Information is located in the CSU-Global Booklist on the Student Portal. Course Schedule Due Dates The Academic Week at CSU-Global begins on Monday and ends the following Sunday. Discussion Boards: The original post must be completed by Thursday at 11:59 p.m. MT and Peer Responses posted by Sunday 11:59 p.m. MT. Late posts may not be awarded points. Opening Exercises: Take the opening exercise before reading each week s content to see which areas you will need to focus on. You may take these exercises as many times as you need. The opening exercises will not affect your final grade. Mastery Exercises: Students may access and retake mastery exercises through the last day of class until they achieve the scores they desire. Critical Thinking: Assignments are due Sunday at 11:59 p.m. MT. Week # Readings Assignments 1 2 3 Chapter 1 in Management of Information Security Discussion (25 points) Critical Thinking (90 points) Chapter 2 in Management of Information Security Discussion (25 points) Critical Thinking (95 points) Portfolio Milestone (20 points) Chapters 3 & 4 in Management of Information Security Discussion (25 points)

4 5 6 7 8 Chapter 2 in Code and Other Laws of Cyberspace through http://www.codev2.cc Critical Thinking (95 points) Chapter 5 in Management of Information Security Discussion (25 points) Chapters 6 & 7 in Management of Information Security Discussion (25 points) Chapters 8 & 9 in Management of Information Security Cavoukian, A. (2009). Privacy by design. Retrieved from http://www.privacybydesign.ca/index.php/paper/priv acy-by-design/ Chapters 10 & 11 in Management of Information Security Critical Thinking (90 points) Discussion (25 points) Discussion (25 points) Chapter 12 in Management of Information Security Discussion (25 points) Assignment Details This course includes the following assignments/projects: Module 1 CRITICAL THINKING ASSIGNMENT (90 points) The McCumber Cube Portfolio (330 points) The McCumber Cube shows three proportions. If theorized, the three dimensions of each axis become a 3 3 3 cube with 27 cells representing areas that must be addressed to secure today s information systems. To ensure system security, each of the 27 areas must be properly addressed during the security process (McCumber, 1991). The three-dimensional model s factors are Confidentiality, Integrity, Availability, Policy, Education, Technology Storage, Processing, and Transmission.

Module 2 Search the internet or the CSU-Global Library for examples of the CNSS security model and its three dimensions. (The LexisNexis Academic database in the Library provides searchable access to a wealth of news articles and features.) Note that you can use the same example or examples for this assignment that you cited for this week s discussion forum. Then briefly elaborate on each of these dimensions and their importance to a solid InfoSec program. Be sure to expand on the importance of each dimension and how they work together to ensure a secure infrastructure. Support your analysis by citing specific statements from the text or two outside sources. Discuss and cite the course textbook and at least one additional credible or scholarly source to support your analysis and positions. The CSU-Global Library is a good place to find credible and scholarly sources. Your paper should be 2-3 pages in length with document and citation formatting per the CSU-Global Guide to Writing & APA. Watch the video below for insight on the CNSS security model and how the dimensions coincide. CNSS security model: https://www.youtube.com/watch?v=_hk3xb4scmw Your paper should be 2-3 pages in length and conform to the CSU-Global Guide to Writing and APA. Include at least two scholarly references in addition to the course textbook. The CSU-Global Library is a good place to find these references. PORTFOLIO PROJECT REMINDER A final Portfolio Project is due at the end of the course. Please read the full Portfolio Project description in the Module 8 folder to preview your Portfolio Project assignment. Also be sure to review the final Portfolio Project grading rubric, which you can find in the Module 8 folder as well. Project: Propose a security policy for your organization Preparation: Choose a real or hypothetical organization, corporation (profit or nonprofit), or institution that uses IT in its product, activities, or operations. If you work in an organization or field that could benefit from an information network security policy, you might wish to apply the project to it. CRITICAL THINKING ASSIGNMENT (95 points) Morals, Ethics, and Law in a Code of Ethics In readings and class discussions, we have talked about the relationship and distinctions between morality and ethics. Morality deals with basic principles of right and wrong or good and bad. Ethics deals with behavior and actions. Provide a cut-and-paste copy of the codes in your assignment or summarize them briefly. Search the internet or the CSU-Global Library to find two examples of a code of ethics and/or code of conduct for an organization or group. Apply what you have learned from the module to identify, describe, and analyze the moral principles, ethical and legal requirements, and implications with respect to criminal behavior (if relevant) that are reflected in each element of the code of ethics case examples that you have found. In the concluding page, evaluate the effectiveness of morals, ethics and law in contributing to the effectiveness of the code overall.

Module 3 Discuss and cite the course textbook and at least one additional credible or scholarly source to support your analysis and positions. The CSU-Global Library is a good place to find credible and scholarly sources. Your paper should be 2-3 pages in length, not counting cut-and-pasted codes, with document and citation formatting per the CSU-Global Guide to Writing and APA. PORTFOLIO PROJECT MILESTONE (20 Points) Scenario Selection Submit a brief description of the real or hypothetical organization, corporation (profit or nonprofit), or institution that uses IT in its product, activities, or operations that will serve as the scenario for your Portfolio Project. If you work or have worked for an organization could benefit from an information network security policy, consider using your place of employment as the scenario for your project. Your description should be at least a paragraph and no more than a page in length. Though you will not receive immediate points for this deliverable, it is a part of your Portfolio Project requirements and points will be applied to or deducted from your final project grade if the deliverable is not completed and submitted as assigned. You will receive valuable instructor feedback on your description that should be processed when you complete the Portfolio assignment. See the Portfolio Project Description and the Portfolio Project grading rubric in the Module 8 folder for details. CRITICAL THINKING ASSIGNMENT (95 points) Case Study Analysis Networks and personal computers are under continuous assault from hackers. The types of attacks vary widely in complexity and severity, but hackers generally have one of three motives for compromising a network (Judge, 2014): Financial fraud Political reasons Personal reasons Search the internet or the CSU-Global Library to find an example of a hacking activity or situation that represents a morally, ethically, or criminally ambiguous situation, but is different from any examples you used in other assignments for this course. Write a critical essay that meets the following requirements: 1. Cite and briefly describe your example. 2. Apply what you have learned from the course to this point to identify arguments both in support of and critical of the behavior of the attackers. 3. Describe and explain the relationships among morality, ethics, law, and crime as they intersect in the case example that you have identified. The CSU-Global Library is a good place to find credible and scholarly sources. Your paper should be 2-3 pages in length with document and citation formatting per the CSU-Global Guide to Writing & APA.

Module 5 Module 8 CRITICAL THINKING ASSIGNMENT (90 points) Security on the Internet Write a 2-3 page critical essay dealing with the following questions. 1. What are the security and privacy risks and vulnerabilities in using the internet? 2. List some specific common attack strategies, and describe how they work. What are their effects/consequences on the security and privacy of both individual users and organizations? Cite some specific examples, and show how the damage can be mitigated or avoided (if possible). 3. How can security awareness and program evaluation mitigate risk? Discuss and cite the course and at least one additional credible or scholarly source to support your analysis and positions. The CSU-Global Library is a good place to find credible and scholarly sources. Your paper should be 2-3 pages in length with document and citation formatting per the CSU-Global Guide to Writing & APA. PORTFOLIO PROJECT (330 Points) Propose a Security Policy for an Organization Preparation: Choose a real or hypothetical organization, corporation (profit or nonprofit), or institution that uses IT in its product, services, activities, and/or operations. If you work in an organization or field that could benefit from an information network security policy, you might wish to apply the project to it. Assignment: Prepare a well-written security policy proposal for your organization that utilizes the concepts learned in the course as a basis for your analysis and policy. Make sure that your proposal includes the basic elements of a good security policy including: 1. Introduction describing your organization and describing its mission, products/services, technical resources, and technical strategy 2. Analysis of the organization s relationships to its clients/customers, staff, management, and owners or other stakeholders 3. A vulnerability assessment 4. Your recommendation, including: a. Proposed remedial measures (as appropriate to the situation; these might include firewall/gateway provisions, authentication and authorization, encryption systems, intrusion detection, virus detection, incident reporting, education/training, etc.) b. Proposed code of ethics or code of practice to be applied within the organization c. Legal/compliance requirements and description of how they will be met d. Proposed security policy statement/summary Important: Your proposal must justify every element of your proposal in ethical and legal terms. In other words, you need to state why each policy/code element (including technical elements) is good for business and why it is good/sound ethical policy (how it is good for the organization and why it is good for customers, users, or employees, or the public). Also identify any ethical/legal tensions, conflicts, and/or contradictions and justify any trade-offs being made in the recommendation. Discuss and cite at least three credible or scholarly sources other than the course textbooks (which can be cited as well) to support your analysis and policy choices. The CSU-Global Library is a good place to find credible and

scholarly sources. Your paper should be 8-10 pages in length with document and citation formatting per the CSU- Global Guide to Writing & APA. Recommendation: It is recommended that students review Chapter 8 in the course textbook, which is required reading for Module 6, early in the term and apply the knowledge therein to planning and drafting the Portfolio Project. In Chapter 8 (and also in the early part of Chapter 10), the textbook author discusses the role of a security policy in the compliance of an organization. He observes that in response to public outcry in the 1990s, governments went on a binge passing laws to regulate the new Internet. But privacy advocates pushed back and by the early 2000s, the result of much politicking was a mixed system of sectoral laws (dealing with specific situations) and largely voluntary norms. These norms were adopted by organizations and enshrined in security and privacy policies regarding data and networking. Kizza (2011) made the point that, A good, balanced and unified approach to information security compliance consists of a good security policy that effectively balances and enforces core information security and compliance elements (p. 184). Incremental Deliverable due 11:59 P.M. on Sunday of Week 2 Submit a brief description of the real or hypothetical organization, corporation (profit or non-profit), or institution that uses IT in its product, activities, or operations that will serve as the scenario for your Portfolio Project. If you work or have worked for an organization could benefit from an information network security policy, consider using your place of employment as the scenario for your project. Your description should be at least a paragraph and no more than a page in length. Course Policies Course Grading 20% Discussion Participation 0% Opening Exercises 8% Mastery Exercises 37% Critical Thinking Assignments 35% Final Portfolio Project Grading Scale and Policies A 95.0 100 A- 90.0 94.9 B+ 86.7 89.9 B 83.3 86.6 B- 80.0 83.2 C+ 75.0 79.9 C 70.0 74.9 D 60.0 69.9 F 59.9 or below In-Classroom Policies For information on late work and incomplete grade policies, please refer to our In-Classroom Student Policies and Guidelines or the Academic Catalog for comprehensive documentation of CSU-Global institutional policies. Academic Integrity Students must assume responsibility for maintaining honesty in all work submitted for credit and in any other work designated by the instructor of the course. Academic dishonesty includes cheating, fabrication, facilitating academic dishonesty, plagiarism, reusing /re-purposing your own work (see CSU-Global Guide to Writing and APA Requirements for percentage of repurposed work that can be used in an assignment), unauthorized possession of academic materials, and unauthorized collaboration. The CSU-Global Library provides information

on how students can avoid plagiarism by understanding what it is and how to use the Library and Internet resources. Citing Sources with APA Style All students are expected to follow the CSU-Global Guide to Writing and APA Requirements when citing in APA (based on the APA Style Manual, 6th edition) for all assignments. For details on CSU-Global APA style, please review the APA resources within the CSU-Global Library under the APA Guide & Resources link. A link to this document should also be provided within most assignment descriptions in your course. Disability Services Statement CSU Global is committed to providing reasonable accommodations for all persons with disabilities. Any student with a documented disability requesting academic accommodations should contact the Disability Resource Coordinator at 720-279-0650 and/or email ada@csuglobal.edu for additional information to coordinate reasonable accommodations for students with documented disabilities. Netiquette Respect the diversity of opinions among the instructor and classmates and engage with them in a courteous, respectful, and professional manner. All posts and classroom communication must be conducted in accordance with the student code of conduct. Think before you push the Send button. Did you say just what you meant? How will the person on the other end read the words? Maintain an environment free of harassment, stalking, threats, abuse, insults or humiliation toward the instructor and classmates. This includes, but is not limited to, demeaning written or oral comments of an ethnic, religious, age, disability, sexist (or sexual orientation), or racist nature; and the unwanted sexual advances or intimidations by email, or on discussion boards and other postings within or connected to the online classroom. If you have concerns about something that has been said, please let your instructor know.