INFO 1101 Introduction to Computer Systems 3 credits
Introduction to effective use of computers for all majors. Includes hands-on use of current computer software, description of computer systems, data files storage, and devices, input/output procedures, computer logic.
Information Assurance Topics Covered
The curriculum of this class is comprised of two primary components; a lecture component which addresses basic information system technologies and a hands-on lab environment.
The lecture component is a cursory review of historical and current concepts and issues of computer information technologies. These elements include but are not limited to the issues of privacy, database abuses, virus/worm, ethical issues, network topologies, Firewalls, and other security issues.
The lab environment is structured for the beginning computer user. The students are instructed on the use of their ISU computer account which includes userids, passwords, email, internet access, network drive utilization and information found in their MY ISU portal.
The concepts presented in the lecture component are reinforced with applications and discussion on the risks associated with our networked society and how these risks are mitigated by the concepts and practices of safe computing.
INFO 3310 Information Systems and Problem Solving 3 credits
Techniques and tools for analyzing and solving cyber business problems. Development of technology based knowledge and skills for communicating solutions. PREREQ OR COREQ: INFO-1101-equivalent skills and knowledge and instructor's permission.
Information Assurance Topics Covered
INFO 3310 contains a module on security with an additional focus on availability and integrity of the data. The course has an overall focus on the use of data
- Computer crime and forensics
- Consumer privacy, protection, & behavior
- Copyright law
- Cyberterrorism
- E-commerce regulation
- E-Discovery
- E-surveillance
- Employer/employee privacy expectations
- Fraud detection & prevention
- Hacker detection & prevention
- Identity theft & identity authentication issues
- Information ethics
- Information sharing
- Intellectual property
- Internet abuse
- Jurisdiction in cyberspace
- Malicious code
- Piracy
- Public policy & law
- Security control & risk analysis
- Spam
- Spyware
- Wireless/mobile security & privacy issues