CSC624 - Cyber and Information Security Policy Analysis
Credit Hours: 4
Course Description
This course examines various aspects of information assurance and cyber security policy planning in an organizational context. The aim is to examine key analysis procedures, such as security requirements analysis and risk assessments, to determine their roles in policy formation. Topics studied in this course include the impact of current legislation, judicial decisions, and government regulations directing the focus of policy formulation
Course Prerequisites
MGT510 or concurrent
Student Learning Outcomes
Upon completion of this course, students will be able to:
Analyze and discuss the field of cyber and information security policy analysis
Analyze and discuss the environment and history of the field of cyber security
Research and formally analyze the field of cyber security policy
Analyze and discuss the measurement, administration, and objectives of cyber security policies, in light of evolving cyber threats
Analyze and discuss how is cyber security designed and deployed, and what does management should expect from cyber security
Research and formally analyze the external and internal environment of cyber security
Analyze and discuss the major factors, which let management develop effective cyber security
Analyze and discuss the format and policy taxonomy of cyber security catalogs
Research and formally analyze the role of catalogs in effective cyber security management
Analyze and discuss governance and user issues in cyber security catalogs
Analyze and discuss conflict, management, and infrastructure issues in cyber security catalogs
Research and formally analyze major issues in cyber security catalog development
Analyze and discuss US cyber security strategy and the history of its development
Analyze and discuss the growing impact of cyber crime, espionage and actions of other nation-states: implementation of US Cyber Command, and congressional actions addressing cyber and information security
Research and formally analyze key elements of US cyber security strategy
Assessment of Outcomes
Specified on the course schedule/outline
Grading System
Letter Grade
Range
Definition
A
90-100
Excellent
B
80-89
Above Average
C
70-79
Average
D
60-69
Below Average
F
0-59
Failing
W
—
Withdrawal during weeks 1 - 7
WF
—
Withdrawal failing after week 7
NF
—
Failing – Not actively engaged
For more details about the Grading System, please see the current catalog.
Active Participation
Students must be actively engaged in the course. For a definition of active engagement, please see the current catalog.
Academic Integrity
Cheating and plagiarism are serious offenses against the University’s academic integrity and are consequently strictly prohibited. All students must familiarize themselves with the University policy on Academic Integrity.
Penalties for cheating and plagiarism are described in the University policy on Academic Integrity in the catalog. They include failure of the assignment, failure for the course, or dismissal from the University. For the complete Cheating/Plagiarism policy, please see the current catalog.
Students with Disabilities
Students who have disabilities that may impact their performance in this course should follow the process described under the heading Accommodations for the Disabled in the current catalog.