ISM4323 INTRODUCTION TO INFORMATION SYSTEMS
Last Updated: Monday January 3rd 2013 18:00
Security has become more and more of an issue in recent years. However it has become a GREAT issue today. We constantly hear about penetrations of Web sites, Denial of Service attacks, young and old hackers. We also experience receiving half a dozen viruses a week, not forgetting the ever annoying spam and countless pop ups that interrupt your log in process. Hackers today do not have to be computer science majors who would write complicated code and bombard you with viruses. Anyone can become a hacker nowadays. However, the tools at a hacker's disposal have become sophisticated and that is what makes this area of concentration so very interesting.
It appears that most issues in security can be solved with technology. Unfortunately, security issues are much more complex than that. Security has to do with PEOPLE. No matter how much technology we implement, there is one factor that we can not ignore. You and Me.
COURSE LEVEL STUDENT LEARNING OUTCOMES
Together with the book, we will examine software that is available today, we will examine hardware and we will conduct this class mainly hands - on. We will look at the legal aspects, we will look at the international arena, and we will write policy and procedures for our own company. We will examine practical solutions, information security basics and managing risk. . We will complete this semester by becoming Web of trust e-notaries.
This course is not only for the MIS student. This course is for the end user, the Manager of an accounting or audit department, the VP of a company who needs to implement policy. This is a great course for your resume. You could be the person writing the policy and procedures of your company. You could become the security officer of the company.
You will be able to recall terminology and concepts related to information security, hardware, software, and networks.
Use MIS to make decision about risk management and acceptance or not of risk.
Prepare policies and procedures for the company or the department.
Build an effective security plan and calculate the return on investment.
Welcome to this Information Security class.
To be able to comfortably follow this course as MIS students:
Prerequisite: Must have already completed and received a passing grade of C or more on CGS 3300
1. You are expected to have the basic skills in handling IBM-PC compatible computer running Windows 3.1, Windows 95/98 or Windows 2000/Me/XP, including file handling operations using file manager/Windows Explorer/ Netscape, basic text editing using Window's notepad or MS Word.
Both 7 and 8 are imperative to communicating with the class
1. The Threat Environment
2. Planning and Policy
4. Security Netwroks
5. Access Controls
7. Host Hardening
8. Application Security
9. Data Protection
10. Incident and Disaster Response
11. What do we protect?
12. First 10 things we need to do
13. The Laws concerning digital environment
14. Digital ids and digital certificates
Please click on the Class Schedule on my web site for a tentative outline of assignments.
REQUIRED COURSE MATERIAL
Corporate Computer Security 3rd Edition ISBN 0-13-214535-9
Randall J Boyle Raymond Panko Pearson - Prentice Hall
The course is a combination of lecture, problem solving tasks, and hands-on exercises. Lectures introduce major concepts and issues. Hands-on exercises provide the opportunity to apply the concepts and develop problem-solving and technical skills.
Students should have a good working knowledge of the Windows environment and be familiar with the Windows Explorer utility. Additionally, students should be able to use Internet resources to access information and communicate electronically.
For more information about pre-requisites, click here
Your instructor has created a web support environment for
this course. The bulk of communication will occur using the
discussion forum and email tools in the course management
If you have a disability and need assistance, please contact the Disability Resource Center (University Park: GC190; 305-348-3532) (North Campus: WUC139, 305-919-5345). Upon contact, the Disability Resource Center will review your request and contact your professors or other personnel to make arrangements for appropriate modification and/or assistance.
Hands-on exercises utilizing the
simulations in SAM 2010. Case
The University's policy on religious holidays as stated in the University Catalog and Student Handbook will be followed in this class. Any student may request to be excused from class to observe a religious holy day of his or her faith.
Because there are some classes and other functions where attendance may be considered essential, the following policy is in effect:
1. Each student shall, upon notifying his/her instructor, be excused from class to observe a religious holy day of his/her faith.
2. While the student will be held responsible for the material covered in his/her absence, each student shall be permitted a reasonable amount of time to make up any work missed.
3. No major test, major class event, or major University activity will be scheduled on a major religious holy day.
4. Professors and University administrators shall not arbitrarily penalize students who are absent from academic or social activities because of religious observances.
For a listing of religious holidays you may visit www.fiu.edu: http://www.interfaithcalendar.org.
The College of Business cares about the quality of your education. More on the College's commitment to Assurance of Learning can be found at the following link:
Assignments from the text and other resources are listed
below for each class session. Students are expected to pace
their learning according to the posted course assignments.
· I will not represent someone else's work as my own
· I will not cheat, nor will I aid in another's cheating
· I will be honest in my academic endeavors
· I understand that if I am found responsible for academic misconduct, I will be subject to the academic misconduct procedures and sanctions as outlined in the Student Handbook
adhere to the guidelines stated above may result in one of
NOTE: Intensive Auditing of the course will be conducted to prevent academic misconduct.
Students are expected to:
· Attend class regularly
· Read assigned chapters
· Complete assignments by scheduled deadlines
· Study and practice
· Contribute meaningfully and substantially to group assignment(s)
1. Exam 1 (25%)
2. Exam 2 (25%)
3. Quizzes (10%)
4. Project I (10%)
5. Project 2 (10%)
6. Homework (10%)
7. Class participation (10%)
Professional quality in the organization, completeness, neatness, and timeliness of material handed in will be expected (including exams).
I would like to point out the following from the Student Handbook – Plagiarism. “The deliberate use and appropriation of another’s work without any indication of the source and the representation of such work as the student’s own. Any student who fails to give credit to ideas, expressions or materials taken from another source, including internet sources, is guilty of plagiarism. Any student helping another to plagiarize may be found guilty of academic misconduct.”
Office hours for this class will be immediately after this class for one hour and upon appointment:
For those of you wanting to see me during office hours, you must make an appointment with me or the department assistants. The assistants in turn will have to allocate an available office in UPC, in our department, RB 250.
My office is located at BBC (A-II 120D) and is therefore unreasonable and inconvenient for both students and myself to drive up from UPC to BBC just to hold an appointment in the official FIU allocated office.
Contact me first for an appointment or further assistance by email (email@example.com) or see me in class. Email response time depends on the volume of emails but I expect it to be within 1-2 working days.
FEEDBACK 1 Exam 1
FEEDBACK 2 Project 1
FEEDBACK 3 Exam 2
FEEDBACK 4 Project 2, Class work and Homework
FEEDBACK 5 Final grade
Communicating with me
The best way to communicate with me is by email.
If your class, for example is ISM4323 this is what should go as a heading in your email subject line
4323/ Zoe Smith/ Panther id / HW 1
Please email me at firstname.lastname@example.org . Do not call my department to leave a message. The staff in the CBA are there to support the faculty in their duties.
Do not send faxes.
Dropping in: It is my pleasure to see you. However, "dropping in" does not necessarily mean that there will be enough time to see you or deal with a particular problem. So, if your business is important make sure that you have emailed me or spoken to me first.