Csia 301 - Syllabus

Only available on StudyMode
  • Topic: 1981, 1979, 1980
  • Pages : 18 (4678 words )
  • Download(s) : 226
  • Published : November 7, 2012
Open Document
Text Preview
Syllabus for CSIA 301 Faculty Contact Information
Welcome to Foundations of Cybersecurity CSIA 301, a hybrid course. My name is Professor Nancy M. Landreville and I have been teaching here at the University of Maryland, University College since February 2007. My phone number is (301) 401-0144. You may contact me by phone any evening during the week (Monday - Friday) from 7:00pm - 9:00pm. You may email me at any time at nancy.landreville@faculty.umuc.edu . I encourage you to use the private messaging area rather than the faculty email address. This will facilitate faster response to your course questions. I will respond to your email within 24 hours from receipt of your email. Please place the name of the course in the subject line so I know the email is from one of my students. I check email every day from my students. I encourage you to contact me with any questions about the course, require that you contact me for extenuating circumstances for late work, and meet with me online for any required conferences that are held during the course. We will meet in the online chat room at least once this semester to discuss the midterm and once this semester to discuss your final assignment. This is in addition to your required face-to-face attendance each week for eight weeks.

Course Description
Prerequisite: CMIS 102. A comprehensive introduction to the protection of business information and the systems that support business processes. The objective is to identify common threats and attacks employed against Web-accessible applications, analyze the role of security models and architectures, explain the role of cryptography, and analyze issues related to security management and network security.

Course Goals/Objectives
After completing this course, you should be able to
     

describe the necessity of secure architecture in information systems analyze the role of security models and architectures and their relationship to information security explain the role of cryptography in protecting information analyze issues related to security management, network security, and operational security in relation to IT infrastructure identify common threats and attacks employed against web-accessible applications identify the security issues that must be addressed during application and system development

Course Introduction

1

Foundations of Cybersecurity is the first course in the Bachelor of Science in cybersecurity program. Although it is an introductory course, it requires the prior completion of CMIS 102, a course in problem solving and algorithm design. In this course, we will cover a broad range of subjects that form the basis of computer system security studies. We will define the concepts of confidentiality, integrity, and availability. In addition, we will explore basic security models, mandatory access control (MAC), discretionary access control (DAC), trusted operating systems, and secure network design. We will present an overview of cryptography, with an emphasis on the terminology, algorithms, techniques, and software used in encrypting information. In addition to other materials, this course consists of the following four modules: Module 1: Security Models and Architecture Module 2: Cryptography—Tools and Techniques Module 3: Networks, Security, and Threats Module 4: Secure Development of Applications and Systems

Grading Information and Criteria
You are responsible for the following graded items: Midterm examination Final examination Homework assignments (6), 2.5% each Module quizzes (4), 4% each module Encryption project Cybersecurity research paper Class participation Total 17% 17% 15% 16% 4% 15% 16% 100%

The grading scale, based on 100 points, is as follows: Performance greatly exceeds established standards for universitylevel performance Performance exceeds established standards Performance meets established standards Performance does not meet established standards 2

A=

90–100...
tracking img