Enrolment options

COURSE DESCRIPTION

This course intends to introduce students to the study of the technical, formal and informal controls to provide systems security and information privacy for organizations. The course among others will include security analysis of technology and organizational systems for information assurance. The course will provide students with an in-depth understanding of technical and managerial issues of information security and privacy. The course achieves this by discussing foundational aspects of a wide spectrum of activities, methods, methodologies, procedures and best practices used in information security and privacy field.

 

COURSE OUTCOMES:

Upon successful completion of this course, students will be able to:

  •  Analyze the  impact of systems security and information privacy for organizations
  • Understand the broad role of information security and information privacy in business processes.
  •  Understand the technical foundations for information security and information privacy.
  •  Study the implications for information security and privacy in Enterprise Information Systems and Inter-Organizational business processes.
  •  Describe legal and public relations implications of security and privacy issues

 

COURSE CONTENT

  •  Introduction to the course Information System Security and Privacy: nature and scope.
  • History of Information Security and Privacy Information and Data Privacy Security of Technical Systems in Organizations Issues in Information Security Issues in Information Privacy.
  •  Internet Communications and TCP/IP Network Security, Firewalls and VPNs .
  •  Information System Risk Management Threats and Attacks
  • Cryptography and Encryption.
  • The art and science of Hacking.
  •  Intrusion Detection and Prevention Systems.
  •  Identity Management.
  •  Information and data Privacy.
  • Security and Privacy of Formal Systems in Organizations Planning for Information System Security and Privacy Designing Information System Security and Privacy Corporate Governance for IS Security and Privacy

 

COMPULSORY READING MATERIALS

  • Jeffrey A. H . Modern Database Management (12th Edition) 
  •   David, K & Michael, G.S .Fundamentals Of Information Systems Security (Information Systems Security & Assurance Series)  (1st Edition)
  •  Sean-Philip & Oriyano  Michael GreggHacker.  Techniques, Tools, And Incident Handling (Jones & Bartlett Learning Information Systems Security & Assurance Series) 1st Edition
  • Darril Gibson. Managing Risk In Information Systems (Information Systems Security & Assurance Series) 1st Edition


Guests cannot access this course. Please log in.