This course allows students to examine a broad range of computer security issues and provides the student with technical knowledge not normally addressed in traditional training. It explores the protection of proprietary information and security planning with an emphasis on networked computer vulnerabilities. It also focuses on detection (e.g. viruses, hackers, types of computer crime, computer forensic examination, etc.), as well as disaster recovery and technology law. Emphasis is placed on the security of systems and computer crime prevention. Also addressed is the maturing criminal population with increased computer literacy, whose tendency is to move from violent actions to more profitable computer crime. Finally, issues of privacy and freedom of information are examined.
At the end of this course, you will have a firm foundation in the cybersecurity field. Both the technical aspects of cybersecurity, as well as security management issues will be an integral part of this course as it applies to criminal justice, political science, information systems, and accounting/business systems. Ongoing changes to the field of cybersecurity will be introduced and reviewed during the term through Discussion Forums and writing assignments.
Course Objectives
- Identify and prioritize information assets.
- Identify and prioritize threats to information assets.
- Define an information security strategy and architecture.
- Plan for and respond to intruders in an information system.
- Describe legal and public relations implications of security and privacy issues.
- Present a disaster recovery plan for the recovery of information assets after an incident.