{"id":231,"date":"2023-02-13T22:54:19","date_gmt":"2023-02-13T22:54:19","guid":{"rendered":"https:\/\/wp.odu.edu\/cyberimpact-template\/?page_id=231"},"modified":"2024-12-09T05:16:06","modified_gmt":"2024-12-09T05:16:06","slug":"ece-416","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/branden-barnes\/ece-416\/","title":{"rendered":"CS 465"},"content":{"rendered":"\n<h1 class=\"wp-block-heading has-text-align-center\">Information Assurance<\/h1>\n\n\n\n<blockquote class=\"wp-block-quote\">\n<p>Information Assurance for Cybersecurity. Topics covered include metrics, planning and deployment; identity and trust technologies; verification and evaluation, and incident response; human factors; regulation, policy languages, and enforcement; legal, ethical, and social implications; privacy and security trade-offs; system survivability; intrusion detection; and fault and security management.<\/p>\n<cite>Nukavarapu, S. (2024). Information Assurance Syllabus. Old Dominion University Canvas.<\/cite><\/blockquote>\n\n\n\n<p>Upon successful completion of this course, students will (Nukavarapu, 2024):<\/p>\n\n\n\n<ol>\n<li>Recognize the general purpose and goals of the course<\/li>\n\n\n\n<li>Explain the need and role of information assurance (IA) in corporate and national security<\/li>\n\n\n\n<li>Discern the threats, vulnerabilities, and risks that an information system is exposed to<\/li>\n\n\n\n<li>Analyze the Information assurance needs of an organization<\/li>\n\n\n\n<li>Identify models to express the IA needs of an organization<\/li>\n\n\n\n<li>Identify measures to express the efficacy of an information system\u2019s assurance capability<\/li>\n\n\n\n<li>Identify privacy and security regulations of a given organization<\/li>\n\n\n\n<li>Discern the legal, ethical, and social implications of an organization\u2019s IA strategies<\/li>\n\n\n\n<li>Identify and analyze potential vulnerabilities in a system<\/li>\n\n\n\n<li>Explain techniques for detecting intrusions (internal or external)<\/li>\n\n\n\n<li>Identify techniques for a system to survive any potential attacks<\/li>\n\n\n\n<li>Match IA needs of an organization with the available technologies<\/li>\n<\/ol>\n\n\n\n<h1 class=\"wp-block-heading\">Course Material<\/h1>\n\n\n\n<p>&nbsp;Security and Privacy Policies and Regulations Assignment:<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/branden-barnes\/wp-content\/uploads\/sites\/32766\/2024\/12\/465-mod-4.pdf\" type=\"application\/pdf\" style=\"width:100%;height:200px\" aria-label=\"Embed of 465-mod-4.\"><\/object><a id=\"wp-block-file--media-20905a9c-509e-40b0-ad35-d2f9e54340f3\" href=\"https:\/\/sites.wp.odu.edu\/branden-barnes\/wp-content\/uploads\/sites\/32766\/2024\/12\/465-mod-4.pdf\">465-mod-4<\/a><a href=\"https:\/\/sites.wp.odu.edu\/branden-barnes\/wp-content\/uploads\/sites\/32766\/2024\/12\/465-mod-4.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-20905a9c-509e-40b0-ad35-d2f9e54340f3\">Download<\/a><\/div>\n\n\n\n<p>Organizational Structure, Planning and Deployment, and Human Factors Assignment:<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/branden-barnes\/wp-content\/uploads\/sites\/32766\/2024\/12\/cs-465-mod-11.pdf\" type=\"application\/pdf\" style=\"width:100%;height:200px\" aria-label=\"Embed of cs-465-mod-11.\"><\/object><a id=\"wp-block-file--media-caf3adee-7055-4bf2-bf41-ab6ec6863410\" href=\"https:\/\/sites.wp.odu.edu\/branden-barnes\/wp-content\/uploads\/sites\/32766\/2024\/12\/cs-465-mod-11.pdf\">cs-465-mod-11<\/a><a href=\"https:\/\/sites.wp.odu.edu\/branden-barnes\/wp-content\/uploads\/sites\/32766\/2024\/12\/cs-465-mod-11.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-caf3adee-7055-4bf2-bf41-ab6ec6863410\">Download<\/a><\/div>\n\n\n\n<p>Information Assurance Legal, Ethical, and Social Implications Assignment:<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/branden-barnes\/wp-content\/uploads\/sites\/32766\/2024\/12\/cs-465-mod-12.pdf\" type=\"application\/pdf\" style=\"width:100%;height:200px\" aria-label=\"Embed of cs-465-mod-12.\"><\/object><a id=\"wp-block-file--media-7bb5a631-8a5f-4484-bcff-d3e68dc83f36\" href=\"https:\/\/sites.wp.odu.edu\/branden-barnes\/wp-content\/uploads\/sites\/32766\/2024\/12\/cs-465-mod-12.pdf\">cs-465-mod-12<\/a><a href=\"https:\/\/sites.wp.odu.edu\/branden-barnes\/wp-content\/uploads\/sites\/32766\/2024\/12\/cs-465-mod-12.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-7bb5a631-8a5f-4484-bcff-d3e68dc83f36\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Information Assurance Information Assurance for Cybersecurity. Topics covered include metrics, planning and deployment; identity and trust technologies; verification and evaluation, and incident response; human factors; regulation, policy languages, and enforcement; legal, ethical, and social implications; privacy and security trade-offs; system survivability; intrusion detection; and fault and security management. Nukavarapu, S. (2024). Information Assurance Syllabus. Old&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/branden-barnes\/ece-416\/\">Read More<\/a><\/div>\n","protected":false},"author":26292,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/branden-barnes\/wp-json\/wp\/v2\/pages\/231"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/branden-barnes\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/branden-barnes\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/branden-barnes\/wp-json\/wp\/v2\/users\/26292"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/branden-barnes\/wp-json\/wp\/v2\/comments?post=231"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/branden-barnes\/wp-json\/wp\/v2\/pages\/231\/revisions"}],"predecessor-version":[{"id":618,"href":"https:\/\/sites.wp.odu.edu\/branden-barnes\/wp-json\/wp\/v2\/pages\/231\/revisions\/618"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/branden-barnes\/wp-json\/wp\/v2\/media?parent=231"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}