Course Information

Course Title:

Principles of Information Systems Security

Course Number:

SEC280

Course Description:

This course provides a broad overview of information systems security in organizations. Topics include security concepts and mechanisms, mandatory and discretionary controls, basic cryptography and its applications, intrusion detection and prevention, information-systems assurance, and anonymity and privacy. Various types of controls used in information systems, as well as security issues surrounding the computer and computer-generated data, are also addressed.

Course Prerequisites:

CIS246 or COMP129 / 3-3.

Course Specific Requirements

Enter content here, if necessary.

Software Citation Requirements

This course uses open-source software, and as the end users of this software, students are required to cite the software for any student work, such as assignments, labs, or projects, where the software has been utilized. Open-source software does have end-user license agreements, and all students should read the entire agreement for a software prior to installation or usage. In order to use the software in this course, software citations have been created for students and can be located on the Open Source Applications page. These software citations must be included in all student work submissions that have used the software.

Textbooks and Resources

Required Textbooks

The following books are required for this course:

Principles of Computer Security, CompTIA Security+ and Beyond

3rd Edition

by William Arthur Conklin, Gregory White, Dwayne Williams, and Roger Davis

ISBN-13: 978-0071786195

ISBN-10: 0071786198


E-book Details

First Time Using VitalSource?

Step 1: View the VitalSource Video

Step 2: Register with VitalSource Bookshelf Online

  1. Select the "eBooks" tab at the top of the window.
  2. Select the cover of your eBook.  A new window will open.
  3. Check the box next to "Accept license agreement" and click "Continue."  Bookshelf Online will open.

Step 3: Access the Desktop and Mobile Versions
You must complete Step 2 prior to using the desktop or mobile versions.

Already Registered?  3 Ways to Access Your eBooks

Online

  1. Select the "eBooks" tab at the top of the window.
  2. Select your eBook.  Bookshelf Online will open.

Desktop

Download your eBooks and use them whether you're connected to the Internet or not.

 

Mobile

Download the app and get your eBooks on your iPhone, iPad, or Android device.

 

To find out more about VitalSource Bookshelf, check out the VitalSource FAQ.

Physical Books and Supplies

Your course may require additional materials, such as a course kit. Visit the online bookstore if you have not yet ordered your books and supplies.

Campus Additional Information

Enter content here, if necessary.

Terminal Course Objectives

DeVry University course content is constructed from curriculum guides developed for each course that are in alignment with specific Terminal Course Objectives. The Terminal Course Objectives (TCOs) define the learning objectives that the student will be required to comprehend and demonstrate by course completion. The TCOs that will be covered in detail each week can be found in the Objectives section for that particular week. Whenever possible, a reference will be made from a particular assignment or discussion back to the TCO that it emphasizes.

1

Given an organization with a need for information security, describe the basic concepts and terms pertaining to the security of an organization.

2

Given an organization with a need for information security, explain the three main components of security management: risk management, security policies and procedures, and security education.

3

Given an organization with a need for information security, describe the security mechanisms and controls available to protect an organization’s informational assets from unauthorized modification or disclosure.

4

Given an organization with a need for information security, explain and identify the appropriate cryptographic encryption algorithms necessary to protect the organization’s assets.

5

Given an organization with a need for information security, describe the various telecommunication and networking standards available to protect the transfer of an organization’s data across local and wide-area networks.

6

Given an organization with a need for information security, describe the various security concerns to consider before and during the development of an application or system.

7

Given a security case, prepare a business continuity plan to identify the critical functions of an organization and explain the strategies to minimize the effects of an outage or loss of service provided by these functions.

8

Given a security case, describe the law applicable to the case concerning the rights, duties, and penalties of individuals in their relationships with each other.

9

Given a security case, describe the investigation process and evidence as it relates to a computer-related crime.

Lab Schedule

Week 1

None
Citrix
RKON
Skillsoft
Toolwire
WebServer
ACC COMAT
ACC NonCOMAT
CWP

Week 2

None
Citrix
RKON
Skillsoft
Toolwire
WebServer
ACC COMAT
ACC NonCOMAT
CWP

Week 3

None
Citrix
RKON
Skillsoft
Toolwire
WebServer
ACC COMAT
ACC NonCOMAT
CWP

Week 4

None
Citrix
RKON
Skillsoft
Toolwire
WebServer
ACC COMAT
ACC NonCOMAT
CWP

Week 5

None
Citrix
RKON
Skillsoft
Toolwire
WebServer
ACC COMAT
ACC NonCOMAT
CWP

Week 6

None
Citrix
RKON
Skillsoft
Toolwire
WebServer
ACC COMAT
ACC NonCOMAT
CWP

Week 7

None
Citrix
RKON
Skillsoft
Toolwire
WebServer
ACC COMAT
ACC NonCOMAT
CWP

Week 8

None
Citrix
RKON
Skillsoft
Toolwire
WebServer
ACC COMAT
ACC NonCOMAT
CWP

Course Schedule

Week, TCOs, and TopicsReadings and Class PreparationActivities and Assignments
Week 1

TCO 1

Introduction to Security

Chapter 1: Introduction and Security Trends

Chapter 2: General Security Concepts

Chapter 3: Operational/Organizational Security

NIST FIPS PUB 199, (2004). Standards for Security Categorization of Federal Information and Information Systems. Digital copy available http://csrc.nist.gov/publications/fips/fips199/FIPS-PUB-199-final.pdf

Exercise—CIA Triad

Graded Discussion Topics

Quiz

Week 2

TCOs 3 and 4

Security Policies and Legal Issues

Chapter 5: Cryptography

Chapter 6: Public Key Infrastructure

Chapter 7: Standards and Protocols

Chapter 25: Privacy

Exercise—Encryption Activity

Virtual Tours

Graded Discussion Topics

Week 3

TCOs 2 and 4

Cryptography

Chapter 4: The Role of People in Security

Chapter 5: Cryptography (continue)

Chapter 6: Public Key Infrastructure (continue)

Chapter 9: Network Fundamentals

Exercise—Asymmetric Encryption

Graded Discussion Topics

Quiz

Week 4

TCOs 3 and 5

Networking

Chapter 7: Standards and Protocols (continue)

Chapter 9: Network Fundamentals

Chapter 11: Authentication and Remote Access

Exercise—Keys

Graded Discussion Topics

Week 5

TCOs 6 and 7

Infrastructure

Chapter 8: Physical Security

Chapter 10: Infrastructure Security

Chapter 12: Wireless Security

Case Study—Access Control

Graded Discussion Topics

Quiz

Week 6

TCOs 3, 5, and 6

Types of Attacks and Malicious Software

Chapter 15: Types of Attacks and Malicious Software

Chapter 16: E-mail and Instant Messaging

Chapter 17: Web Components

Exercise—BOTLAB

Graded Discussion Topics

Week 7

TCOs 2, 7, and 9

Risk and Business Continuity and Management

Chapter 19: Disaster Recovery, Business Continuity, and Organizational Policies

Chapter 20: Risk Management

Chapter 21: Change Management

Chapter 22: Privilege Management

Chapter 23: Computer Forensics

Exercise—Bulk Extractor

Graded Discussion Topics

Week 8
All TCOs

Final Exam

Blended E-Learning

This course is an 8-week, intensive course that includes both classroom-based and e-learning activities. Your participation in both areas is essential to your success in this course. You should expect to spend time each week participating in the prescribed activities both before and after our class meeting.

Participation before, during, and after class meetings is critical to your success in this intensive environment.

To get the most out of our weekly class meetings, it is essential that you come to class prepared. The weekly readings listed in the Course Schedule will prepare you for class. Our class meetings, in turn, will prepare you for upcoming exams and assignments.

Through the DeVry e-learning platform, you will be able to

  • review the Syllabus and weekly assignment information;
  • submit completed work for grading;
  • take quizzes and exams;
  • obtain copies of class handouts and notes;
  • e-mail the instructor and other students; and
  • participate in online discussion of class material.

iConnect Live

This course contains iConnect Live sessions that provide students with the opportunity to attend live presentations, which cover course materials, projects, and assignments. Please see the iConnect Live items for the days and times of the live sessions and for the link to enter each session. You will also receive e-mail reminders each week.

If you are unable to attend the live session, you can watch the recorded session by clicking on the Recordings link that will appear in the iConnect Live item after the lecture has concluded. Please contact your instructor with any questions.

Please note that because of unavoidable technological issues and presenter availability, the live lectures may be substituted with prerecorded lectures.

Due Dates for Assignments & Exams

Unless otherwise specified, the following applies.

  • Access to most weeks begins on Sunday at 12:01 a.m. mountain time (MT).
  • All assignments are to be submitted on or before Sunday at the end of the specified week that they are due, by 11:59 p.m. (MT).
  • All quizzes and exams are to be completed on or before Sunday at the end of the specified week that they open, by 11:59 p.m. (MT).

Note: Week 8 opens at 12:01 a.m. (MT) on the ending Sunday of Week 7. Any assignments or exams must be completed by 11:59 p.m. (MT) Saturday of the eighth week.

Due Dates for Assignments & Exams

All assignments, quizzes, and exams are to be completed per the schedule indicated by your instructor.

Assignment Values and Letter Grades

The maximum score in this class is 1,000 points. The categories, which contribute to your final grade, are weighted as follows.

AssignmentPointsWeighting
Discussions
(40 points, Weeks 1–7)
280
28%
Quizzes
(30 points, Weeks 1, 3, and 5)
909%
Exercises
(50 points, Weeks 1, 2, 3, 4, 6 and 7)
30030%
Case Studies
(70 points, Week 5)
70
7%
Final Exam26026%
Total Points1,000100%

All of your course requirements are graded using points. At the end of the course, the points are converted to a letter grade using the scale in the table below.

Letter GradePointsPercentage
A900–1,00090% to 100%
B800–89980% to 89%
C700–79970% to 79%
D600–69960% to 69%
F599 and belowBelow 60%

DeVry Graduate Academic Policy and Relevant Resources

DeVry Undergraduate Academic Policy and Relevant Resources

Frequently Asked Questions

When are grades calculated, and how can I view my grades?

  • You must complete any quizzes and post your written assignments (if necessary) to the weekly Dropbox by Sunday 11:59 p.m. (MT) each week, except Week 8 which closes at 11:59 p.m. (MT) Saturday.
  • Once your work is reviewed, you should see comments and total points for each assignment in the Gradebook. Instructors should have Discussion work graded by the following Tuesday and all other assignments by the following Friday.
  • You may check your progress at any time by going to the Gradebook, selecting the week and then your name.
  • Click on the points earned for each assignment in the Gradebook to see any instructor comments.

What should I do if a discrepancy is found with my grade?

  1. Double-check the error and try to determine what caused it.
  2. Send your instructor an email explaining your findings.
  3. Trust that any error in grading will be corrected quickly

What if I cannot get my work submitted on time?

  • If you have an emergency that will cause your work to be late, please contact your instructor in advance of the due date so that arrangements can be made. Your instructor may reserve the right to deduct points for work turned in late based on the reason and the timeliness of notice.
  • If a technical problem prevents you from meeting the scheduled due date, please contact the Help Desk at 1-800-594-2402 and immediately email your instructor about the situation.

How can I get extra credit?

Extra credit is not an option.

Questions and Concerns

Please feel free to contact me for help with coursework or other areas that may impact your progress. Here are some examples.

  • Do you have general questions about attendance, deadlines regarding your courses, student financial aid, or other areas? 
  • Are you a member of the military service? Do you need to adjust your schedule due to active duty, or do you have questions about your GI Bill® benefits or have other unforeseen military and veteran-related issues that have developed?
  • Do you need supplementary student assistance? Please let me know if you are having academic difficulty and would like an ADA accommodation. Although I can talk with you about getting assistance, an excellent point of contact is the Office of Student Disability Services. You can reach the Office by calling 877-496-9050, option 3, or by e-mailing adaofficer@devry.edu or adaofficer@keller.edu.

Regardless of your situation, please feel free to contact me for assistance in whatever area of concern you might have. I will do everything I can to assist you or put you in contact with University colleagues who are trained to assist you in whatever area of concern you might have.

"GI Bill® is a registered trademark of the U.S. Department of Veterans Affairs (VA). More information about education benefits offered by the VA is available at the official U.S. government website: www.benefits.va.gov/gibill.”

Top