College of Information Systems & Technology
Copyright © 2010, 2009, 2008, 2006, by University of Phoenix. All rights reserved.
This course covers the managerial and technical considerations related to access controls, authentication, external attacks, and other risk areas facing the enterprise. This course will also survey the techniques to prevent unauthorized computer and facility access as well the concepts for protecting the hardware and software assets of the enterprise.
Faculty and students/learners will be held responsible for understanding and adhering to all policies contained within the following two documents:
University policies: You must be …show more content…
(2008). IT security audits best practices. Faulkner Information Services.
All electronic materials are available on the student website.
Week One: Enterprise System Architecture—Overview
1.1 Understand the unique design, operation, and management conditions associated with an Enterprise System Architecture (ESA).
1.2 Identify core operational priorities associated with the development and management of cross-functional enterprise systems.
1.3 Recognize the major elements of Enterprise Application Architecture (EAA).
1.4 Examine major security issues associated with Enterprise Application Integration (EAI) and Enterprise Collaboration Systems (ECS).
Read Ch. 1, “Our Digital Planet”, in Tomorrow’s Technology and You.
Read Ch. 2, “Hardware Basics: Inside the Box”, in Tomorrow’s Technology and You.
Read Ch. 3, “Hardware Basics: Peripherals”, in Tomorrow’s Technology and You.
Read Ch. 4, “Software Basics: The Ghost in the Machine”, in Tomorrow’s Technology and You.
Read Ch. 7, “E-Business Systems”, in Management Information Systems.
Read the Week One Read Me First.
Read this week’s Electronic Reserve …show more content…
This Learning Team Project requires students to develop a semi-quantitative, weighted analysis that generates a comprehensive threat/vulnerability analysis of enterprise security, along with appropriate security measures and recommendations. Additionally, the readings provide background information supporting various techniques, as well as how to do assessments, how to create rankings, and so forth. These readings should be previewed as early as possible, rather than waiting for the specific week. The Enterprise Security Plan is due in Week