Preview

Syllabus MIS 6330

Good Essays
Open Document
Open Document
3060 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Syllabus MIS 6330
Course Syllabus
MIS 6330
School of Management
The University of Texas at Dallas

| Course Info | Tech Requirements | Access & Navigation | Communications | Resources | Assessments | Academic Calendar | Scholastic Honesty | Course Evaluation | UTD Policies |

Course Information

Course

Course Number Section MIS 6330.0I1
Course Title Information Technology Security
Term and Dates Spring 2013

Professor Contact Information
Professor Huseyin Cavusoglu
Office Phone (972) 883-5939
Email Address eLearning Email
Office Location JSOM 3.418
Online Office Hours N/A Other Information The quickest and easiest way to contact me is through email. If it is a topic that needs to be addressed over the phone, you can email me to set up a time to call/meet.

About the Instructor
Dr. Cavusoglu is an associate professor of information systems in the Jindal School of Management at UTD. Prior to joining to UTD, he was an assistant professor in the A.B. Freeman School of Business at Tulane University. He received his PhD in management science with specialization in information systems in 2003. His teaching specialty is information technology security, and he has been teaching this course since 2003. His main research interests include information security management and the economics of information systems. He has published articles on the economic aspects of information security in various academic journals.

Course Pre-requisite MIS 6304 or MIS 6350

Course Description
The need for organizations to protect critical information assets continues to increase. Today, more than ever, organizations require professionals who understand technical issues and who are also capable of devising security strategies. Contrary to the common view, information security is mainly a managerial problem. Only through effective management of security, can security polices be defined and technical solutions be selected. The

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Imagine that you are working for a startup technology organization that has had overnight success. The organization’s immediate growth requires for it to formulate a corporate strategy for information security. You have been recruited to serve as part of a team that will develop this strategy.…

    • 514 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Is4231 Week 5

    • 3436 Words
    • 14 Pages

    Evaluate the internal and external factors that influence the activities and organization of an information security program List and describe the typical job titles and functions performed…

    • 3436 Words
    • 14 Pages
    Powerful Essays
  • Powerful Essays

    Kudler Security Report

    • 8349 Words
    • 34 Pages

    References: Whitman, M., & Mattord, H. (2010). Management of Information Security (3rd ed.). Retrieved from https://ecampus.phoenix.edu/content/eBookLibrary2/content/eReader.aspx?…

    • 8349 Words
    • 34 Pages
    Powerful Essays
  • Powerful Essays

    Syllabus Busi 681 Fall 2010

    • 2403 Words
    • 10 Pages

    This course is intended to provide the student with a basic introduction to the microeconomics of the firm. The emphasis will be on the firm decision-making process and how that process influences firm performance. Firm performance can have many dimensions, although this course will primarily concern itself with profitability. The course will examine the market environment of the firm and the role of government in the market. Topics to be covered include:…

    • 2403 Words
    • 10 Pages
    Powerful Essays
  • Powerful Essays

    This course is designed to provide students with an understanding of the practical use of enterprise resource planning systems in modern business. Specifically, the course has the following objectives:…

    • 2323 Words
    • 10 Pages
    Powerful Essays
  • Satisfactory Essays

    Syllabus Res 341

    • 4019 Words
    • 17 Pages

    Sekaran, U. (2003). Research methods for business: A skill-building approach (4th ed.). New York, NY: John Wiley & Sons.…

    • 4019 Words
    • 17 Pages
    Satisfactory Essays
  • Best Essays

    This course is an introductory course, surveying major issues in international politics. The first section…

    • 2016 Words
    • 12 Pages
    Best Essays
  • Satisfactory Essays

    Syllabus Qrb-501

    • 1165 Words
    • 5 Pages

    Course Description This course applies quantitative reasoning skills to business problems. Students learn to analyze data using a variety of analytical tools and techniques. Other topics include formulas, visual representation of quantities, time value of money, and measures of uncertainty. Policies Faculty and students/learners will be held responsible for understanding and adhering to all policies contained within the following two documents: • • University policies: You must be logged into the student website to view this document. Instructor policies: This document is posted in the Course Materials forum.…

    • 1165 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Security Breach at Tjx

    • 288 Words
    • 2 Pages

    Assignment 3 requires you to critically review the assigned case study and write a report…

    • 288 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    107 Syllabus S15

    • 773 Words
    • 4 Pages

    Reading 1: Business and Politics in the U.S., Graham Wilson, “Business & Politics, A Comparative Introduction,” 2003…

    • 773 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    For businesses to keep pace with the latest technology, threats and to remain in compliance with current and future regulations or policies need to have effective management of information security in their organization. Information Security Management Frameworks are based on existing accepted standards, guidelines, and collections of practices that should be implemented in an IT department. I will discuss some frameworks of information security management, their pros and cons, some major perspectives to consider in information security management and the benefits of information security management frameworks.…

    • 721 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    James M. Stewart, M. C. CISSP- Certified Information Systems Security Profession Study Guide (Vol. 6th ed).…

    • 1033 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Cyber Warfare/Motivations

    • 1841 Words
    • 8 Pages

    Layton, Timothy P. (2007). Information Security: Design, Implementation, Measurement, and Compliance. Boca Raton, FL: Auerbach publications.…

    • 1841 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    Management’s Role in Information Security V.T. Raja, Ph.D., Oregon State University Outline • Example: iPremier Company (HBR article) – Background about company – Business Implications – Some recommendations for future • Management’s role in information security • Framework for a balanced approach to security Example: DDoS attack on iPremier Company • For a background about the company - refer to MS Word Document distributed in class. • Problems at Colocation facility: •…

    • 1251 Words
    • 10 Pages
    Good Essays
  • Better Essays

    In today’s time, every organization is made up of information security systems. Information security systems are what keep an organization running smoothly and efficiently while holding all their important information in their computers and networks. All information security systems consist of password protections, firewalls; many different security features can prevent hackers from attacking, physical protection of the network and computer systems as well as confidentiality requirements.…

    • 1131 Words
    • 5 Pages
    Better Essays