CS 465

Information Assurance

Information Assurance for Cybersecurity. Topics covered include metrics, planning and deployment; identity and trust technologies; verification and evaluation, and incident response; human factors; regulation, policy languages, and enforcement; legal, ethical, and social implications; privacy and security trade-offs; system survivability; intrusion detection; and fault and security management.

Nukavarapu, S. (2024). Information Assurance Syllabus. Old Dominion University Canvas.

Upon successful completion of this course, students will (Nukavarapu, 2024):

  1. Recognize the general purpose and goals of the course
  2. Explain the need and role of information assurance (IA) in corporate and national security
  3. Discern the threats, vulnerabilities, and risks that an information system is exposed to
  4. Analyze the Information assurance needs of an organization
  5. Identify models to express the IA needs of an organization
  6. Identify measures to express the efficacy of an information system’s assurance capability
  7. Identify privacy and security regulations of a given organization
  8. Discern the legal, ethical, and social implications of an organization’s IA strategies
  9. Identify and analyze potential vulnerabilities in a system
  10. Explain techniques for detecting intrusions (internal or external)
  11. Identify techniques for a system to survive any potential attacks
  12. Match IA needs of an organization with the available technologies

Course Material

 Security and Privacy Policies and Regulations Assignment:

Organizational Structure, Planning and Deployment, and Human Factors Assignment:

Information Assurance Legal, Ethical, and Social Implications Assignment: