CS 465

Information Assurance for Cybersecurity

Topics to be covered include metrics, planning and deployment; identity and trust technologies; verification and evaluation, and incident response; human factors; regulation, policy languages, and enforcement; legal, ethical, and social implications; privacy and security trade-offs; system survivability; intrusion detection; and fault and security management. The learning outcomes for this course are as follows:

  1. Recognize the general purpose and goals of the online course,
  2. Explain the need and role of information assurance (IA) in corporate and national security,
  3. Discern the threats, vulnerabilities, and risks that an information system is exposed to,
  4. Analyze the Information assurance needs of an organization,
  5. Identify models to express the IA needs of an organization,
  6. Identify measures to express the efficacy of an information system’s assurance capability,
  7. Identify privacy and security regulations of a given organization,
  8. Discern the legal, ethical, and social implications of an organization’s IA strategies,
  9. Identify and analyze potential vulnerabilities in a system,
  10. Explain techniques for detecting intrusions (internal or external),
  11. Identify techniques for a system to survive any potential attacks,
  12. Match IA needs of an organization with available technologies.

Course Material

Students in this course have completed a number of activities including an final course project paper, weekly discussion board posts, weekly homework assignments, several technology and cybersecurity journals,  and two exams.

Information-Assurance-Final-Report