Course Information

Course Title:

E-Business Security

Course Number:

SEC573

Course Description:

This course covers issues involved in protecting an e-business from external threats, while safeguarding customer privacy. Students examine external threats to and vulnerabilities in a company's systems and learn how to react if systems and business goals conflict.

Course Prerequisites:

SEC571

Course Specific Requirements

Course Projects

There are two projects assigned in this course:

  • Research Project 1, Designing Security for a Web-Based Business Process
  • Research Project 2, Recommended Action to Address A Recent E-Commerce Threat

See Syllabus "Due Dates for Assignments & Exams" for due date information.

The specific requirements for these assignments can be found in Course Projects Requirements in Doc Sharing.

Final Exam Grading

The Final Exam is based on our Terminal Course Objectives. It has question pools for each TCO, and one or more questions per TCO will be on the exam. Questions are chosen randomly so it is recommended to create a paragraph or two per TCO as a study guide each week as the material is covered.



Software Citation Requirements

This course uses open-source software, and as the end users of this software, students are required to cite the software for any student work, such as assignments, labs, or projects, where the software has been utilized. Open-source software does have end-user license agreements, and all students should read the entire agreement for a software prior to installation or usage. In order to use the software in this course, software citations have been created for students and can be located on the Open Source Applications page. These software citations must be included in all student work submissions that have used the software.

Textbooks and Resources

Required Textbooks

The following books are required for this course:

The CISSP® and CAP Prep Guide: Platinum Edition


by Ronald L. Krutz and Russell Dean Vines



 

Securing E-Business Systems: A Guide for Managers and Executives


by Timothy Braithwaite



 

Optional but recommended reading:

  • Security Metrics; Replacing Fear, Uncertainty, and Doubt by Andrew Jaquith, Addison-Wesley, 2007. ISBN-13: 978-0-321-34998-9
  • Information Assurance for the Enterprise by Corey Schou and Dan Shoemaker, McGraw-Hill, 2007. ISBN-13: 978-0-07-225524-9

E-book Details

First Time Using VitalSource?

Step 1: View the VitalSource Video

Step 2: Register with VitalSource Bookshelf Online

  1. Click the cover or title of your eBook. A new window will open.
  2. Enter email address and password. Bookshelf Online will open.

Step 3: Access the Desktop and Mobile Versions

You must complete Step 2 prior to using the desktop or mobile versions.

Already Registered?   3 Ways to Access Your eBooks

Bookshelf

Online

Access your eBook by clicking on the book cover or title in the syllabus page. Bookshelf Online will open.

Desktop devices

Desktop

Download your eBooks and use them whether you're connected to the Internet or not.

Mobile devices

Mobile

Download the app and get your eBooks on your iPhone, iPad, or Android device.

Campus Additional Information

Enter content here, if necessary.

Terminal Course Objectives

DeVry University course content is constructed from curriculum guides developed for each course that are in alignment with specific Terminal Course Objectives. The Terminal Course Objectives (TCOs) define the learning objectives that the student will be required to comprehend and demonstrate by course completion. The TCOs that will be covered in detail each week can be found in the Objectives section for that particular week. Whenever possible, a reference will be made from a particular assignment or discussion back to the TCO that it emphasizes.

A

Given the wide array of current E-Businesses, develop an understanding of the way systems and business goals conflict. The essential elements of a corporate security management program are analyzed in terms of its value and impact to the organization. Attention is paid to behavioral, financial and agility conflicts.

B

Given B2C, B2B and C2C environments, design guidelines, policies and procedures that should assure customer privacy and comply with current laws, while also providing personalized and customized E-Businesses services. Develop a practical understanding of how techniques such as datamining, collaborative-filtering, and adaptive marketing systems can violate customer privacy, and destroy customer confidence. Special attention is paid to the changing consumer and management attitudes, national and international laws, liability issues and emerging technologies.

C

Given the global, and persistent presence of external threats; demonstrate a sound understanding of those threats in terms of their, origins, motivations, limits, goals, trends and destructive potential. Attention is paid to individual hackers, hacker teams, corporate espionage threats, political enemies, and organized crime.

D

Given the need to prevent, and stop, both external and internal threats, demonstrate the ability to properly utilize proactive security techniques. Attention is paid to penetration testing, ethical hacking, intrusion countermeasures, and intrusion detection technologies. Both managerial and technical aspects are explored.

E

Given the need for highly adaptable E-Business security management programs, define and document the job functions, organizational structure, and staffing requirements that should foster a highly-secure E-Business environment. Attention is also paid to integration with contracted security management services.

F

Given the limitations of corporate and public funds, forecast and justify enterprise and business-unit security programs. Examine the issues associated with continuous cost/benefit analysis, global security projects, contingency planning, disaster recovery drills, and corporate mergers as they effect security system integration.

G

Given the need to outsource various security services, understand the current options available through private and public organizations, both national and international. Vendor relationship management, risk sharing, change control and performance measurements are closely examined.  The focus of the vendor relationship is to help deliver a broad, flexible and highly responsive E-Business security system.

Lab Schedule

Week 1

None
Citrix
RKON
Skillsoft
Toolwire
WebServer
ACC COMAT
ACC NonCOMAT
CWP

Week 2

None
Citrix
RKON
Skillsoft
Toolwire
WebServer
ACC COMAT
ACC NonCOMAT
CWP

Week 3

None
Citrix
RKON
Skillsoft
Toolwire
WebServer
ACC COMAT
ACC NonCOMAT
CWP

Week 4

None
Citrix
RKON
Skillsoft
Toolwire
WebServer
ACC COMAT
ACC NonCOMAT
CWP

Week 5

None
Citrix
RKON
Skillsoft
Toolwire
WebServer
ACC COMAT
ACC NonCOMAT
CWP

Week 6

None
Citrix
RKON
Skillsoft
Toolwire
WebServer
ACC COMAT
ACC NonCOMAT
CWP

Week 7

None
Citrix
RKON
Skillsoft
Toolwire
WebServer
ACC COMAT
ACC NonCOMAT
CWP

Week 8

None
Citrix
RKON
Skillsoft
Toolwire
WebServer
ACC COMAT
ACC NonCOMAT
CWP

Course Schedule

Week, TCOs, and TopicsReadings and Class PreparationActivities and Assignments
Week 1

TCO A

Conflict

Securing E-Business Systems:

  • Chapter 1: Information Security and Risk Management
  • Chapter 2: Access Control

CISSP Prep Guide:

  • Chapter 3: Telecommunications and Network Security (pp 123-221)

Week 1 Lecture: Network Technology and Security Review

Week 1 PowerPoint: E-Commerce (available in Doc Sharing)

Graded Discussion Participation


Quiz (Week 1 Reading and Assignments)

Week 2

TCO B

Privacy and Liability

Securing E-Business Systems:

  • Chapter 8: Computers, Software, Security, and Issues of Liability

CISSP Prep Guide:

  • Chapter 2: Access Control (pp 55-88)
  • Chapter 9: Law, Investigation, and Ethics

 

Week 2 Lecture: Security as a Profession: Unwanted Responsibility?

Week 2 PowerPoint: Data Warehousing and Mining (available in Doc Sharing)

Graded Discussion Participation

Week 3

TCO C

Risk Management

Securing E-Business Systems:

  • Chapter 5: A "Just-in-Time" Strategy for Security the E-Business System

CISSP and CAP Prep Guide:

  • Chapter 1: Security Management Practices
  • Chapter 3: Telecommunications and Network Security (pp 95-123)
  • Chapter 6: Operations Security

Week 3 Lecture: Risk Management

Week 3 PowerPoint: E-Business Threats (available in Doc Sharing)

Graded Discussion Participation


Research Project 1: A Recent E-Commerce Threat

Week 4

TCO D

Best Practices

Securing E-Business Systems:

  • Chapter 4: Managing E-Business Systems and Security (pp. 58-97)
  • Chapter 6: Designing and Delivering Secured E-Business Application Systems
  • Appendix B: Systems Development Review Framework for E-Business Systems (Sample)

CISSP and CAP Prep Guide:

  • Chapter 4: Cryptography
  • Chapter 7: Applications and Systems Development

Week 4 Lecture: Securing Web Services

Graded Discussion Participation

 Midterm Exam (Week 1 - 4 Reading and Assignments)
Week 5

TCO E

Security Management

Securing E-Business Systems:

  • Chapter 4: Managing E-Business Systems and Security (pp 97-128)

CISSP and CAP Prep Guide:

  • Chapter 5: Security Architecture and Models
  • Chapter 11: Understanding Certification and Accreditation

Week 5 Lecture: Can There Ever Be a Universal Security Standard?

Week 5 PowerPoint: Security Standards (available in Doc Sharing)

Graded Discussion Participation

Week 6

TCO F

Cost/Benefit Assessment

Securing E-Business Systems:

  • Chapter 7: Justifying E-Business Security and the Security Management Program
CISSP Prep Guide:
  • Chapter 8: Business Continuity Planning and Disaster Recovery Planning
  • Chapter 10: Physical (Environmental) Security
Week 6 Lecture: Disaster Recovery System Development Life Cycle

Week 6 PowerPoint: E-Business Incidents (available in Doc Sharing)

 

Graded Discussion Participation


Quiz (Weeks 5 & 6 Reading and Assignments)

Week 7

TCO G

Outsourcing

Securing E-Business Systems:

  • Appendix C: A Corporate Plan of Action for Securing E-Business Systems (Sample)

Week 7 Lecture: Service Level Agreement Implementation

Week 7 PowerPoint: Security Metrics (available in Doc Sharing)

Graded Discussion Participation

Research Project 2: Recommended Action to Address a Recent E-Commerce Threat

Week 8
All TCOs
Final Exam

Blended E-Learning

This course is an 8-week, intensive course that includes both classroom-based and e-learning activities. Your participation in both areas is essential to your success in this course. You should expect to spend time each week participating in the prescribed activities both before and after our class meeting.

Participation before, during, and after class meetings is critical to your success in this intensive environment.

To get the most out of our weekly class meetings, it is essential that you come to class prepared. The weekly readings listed in the Course Schedule will prepare you for class. Our class meetings, in turn, will prepare you for upcoming exams and assignments.

Through the DeVry e-learning platform, you will be able to

  • review the Syllabus and weekly assignment information;
  • submit completed work for grading;
  • take quizzes and exams;
  • obtain copies of class handouts and notes;
  • e-mail the instructor and other students; and
  • participate in online discussion of class material.

iConnect Live

This course contains iConnect Live sessions that provide students with the opportunity to attend live presentations, which cover course materials, projects, and assignments. Please see the iConnect Live items for the days and times of the live sessions and for the link to enter each session. You will also receive e-mail reminders each week.

If you are unable to attend the live session, you can watch the recorded session by clicking on the Recordings link that will appear in the iConnect Live item after the lecture has concluded. Please contact your instructor with any questions.

Please note that because of unavoidable technological issues and presenter availability, the live lectures may be substituted with prerecorded lectures.

Due Dates for Assignments & Exams

Unless otherwise specified, the following applies.

  • Access to most weeks begins on Sunday at 12:01 a.m. mountain time (MT).
  • All assignments are to be submitted on or before Sunday at the end of the specified week that they are due, by 11:59 p.m. (MT).
  • All quizzes and exams are to be completed on or before Sunday at the end of the specified week that they open, by 11:59 p.m. (MT).

Note: Week 8 opens at 12:01 a.m. (MT) on the ending Sunday of Week 7. Any assignments or exams must be completed by 11:59 p.m. (MT) Saturday of the eighth week.

Due Dates for Assignments & Exams

All assignments, quizzes, and exams are to be completed per the schedule indicated by your instructor.

Assignment Values and Letter Grades

The maximum score in this class is 1,000 points. The categories, which contribute to your final grade, are weighted as follows.

AssignmentPointsWeighting
Discussions (40 points, Weeks 1-7)28028%
Quiz (60 points, Weeks 1 and 6) 
12012%
Research Project (100 points, Weeks 3 and 7)20020%
Midterm15015%
Final Exam25025%
Total Points1,000100%

All of your course requirements are graded using points. At the end of the course, the points are converted to a letter grade using the scale in the table below.

Final grades are based on the percentage equivalent in the chart below and are not rounded to the next higher letter grade.

Letter GradePointsPercentage
A  930–1,00093% to 100%
A- 900–92990% to 92.9%
B+870–89987% to 89.9%
B  830–86983% to 86.9%
B- 800–82980% to 82.9%
C+770–79977% to 79.9%
C  730–76973% to 76.9%
C- 700–72970% to 72.9%
D+670–69967% to 69.9%
D  630–66963% to 66.9%
D- 600–62960% to 62.9%
F  599 and belowBelow 60%

DeVry Graduate Academic Policy and Relevant Resources

DeVry Undergraduate Academic Policy and Relevant Resources

Frequently Asked Questions

When are grades calculated, and how can I view my grades?

  • You must complete any quizzes and post your written assignments (if necessary) to the weekly Dropbox by Sunday 11:59 p.m. (MT) each week, except Week 8 which closes at 11:59 p.m. (MT) Saturday.
  • Once your work is reviewed, you should see comments and total points for each assignment in the Gradebook. Instructors should have Discussion work graded by the following Tuesday and all other assignments by the following Friday.
  • You may check your progress at any time by going to the Gradebook, selecting the week and then your name.
  • Click on the points earned for each assignment in the Gradebook to see any instructor comments.

What should I do if a discrepancy is found with my grade?

  1. Double-check the error and try to determine what caused it.
  2. Send your instructor an email explaining your findings.
  3. Trust that any error in grading will be corrected quickly

What if I cannot get my work submitted on time?

  • If you have an emergency that will cause your work to be late, please contact your instructor in advance of the due date so that arrangements can be made. Your instructor may reserve the right to deduct points for work turned in late based on the reason and the timeliness of notice.
  • If a technical problem prevents you from meeting the scheduled due date, please contact the Help Desk at 1-800-594-2402 and immediately email your instructor about the situation.

How can I get extra credit?

Extra credit is not an option.

Questions and Concerns

Please feel free to contact me for help with coursework or other areas that may impact your progress. Here are some examples.

  • Do you have general questions about attendance, deadlines regarding your courses, student financial aid, or other areas? 
  • Are you a member of the military service? Do you need to adjust your schedule due to active duty, or do you have questions about your GI Bill® benefits or have other unforeseen military and veteran-related issues that have developed?
  • Do you need supplementary student assistance? Please let me know if you are having academic difficulty and would like an ADA accommodation. Although I can talk with you about getting assistance, an excellent point of contact is the Office of Student Disability Services. You can reach the Office by calling 877-496-9050, option 3, or by e-mailing adaofficer@devry.edu or adaofficer@keller.edu.

Regardless of your situation, please feel free to contact me for assistance in whatever area of concern you might have. I will do everything I can to assist you or put you in contact with University colleagues who are trained to assist you in whatever area of concern you might have.

"GI Bill® is a registered trademark of the U.S. Department of Veterans Affairs (VA). More information about education benefits offered by the VA is available at the official U.S. government website: www.benefits.va.gov/gibill.”

Top