INFO 4411 Intermediate Information Assurance 3 Credits
||Intermediate Information Assurance
||45 contact hours during 15 weeks
||Focuses on homeland security, information assurance, integrity, control, and privacy. Covers CNSS-4011, NIST-800-16 standards, national policy, and international treaties. The course considers Software Deployment, Operations, Maintenance and Disposal, including security issues around steady state operations and management of software, as well as security measures that must be taken when a product reaches its end of life. PREREQ: INFO 2285 or CS 2275 or INFO 3310, or permission of instructor. D
||Junior Standing and database course, any law course or INFO 3310; or instructor permission
|Course Learning Objective:
||The original McCumber model is used to provide a framework for the student. The student will be able to create a security plan, explain and discuss access control and building secure systems.
- Introduction to Computer Security
- Computer Security definition, laws, historical perspective
- Access Control
- Identification and Authentication; Discretionary Access Control
- Mandatory Access Control and Supporting Policies
- Building Secure Systems
- Design and implementation concepts that support assurance
- Malicious Software and Intrusion Detection
- Trojan horses, viruses, worms, etc.
- Certification and Accreditation, Disaster Planning and Recovery and Risk Analysis
- Certification and accreditation issues
- Basics of Cryptography
- Private key, public key and hashing schemes
- Cryptographic Protocols and Applications
- Cryptographic protocols for providing secrecy, integrity and authentication
- Network Security
- Special considerations, combining access control and cryptography
- Network Security in Today’s Environment
- TCP/IP, Internet and firewalls
- Building Secure Systems II
- * System evaluation issues
|Method of Instruction:
||This is a lecture course involving planning and implementation issues associated with Information Assurance. The student will have limited hands on and research activities. The student is required to develop a research paper that is part of the class discussion.
||As an introductory course, the student is evaluated predominantly by examination and by evaluation of a research paper. The examinations cover the fundamental understanding of the vocabulary of Information Assurance. The research paper allows the student to focus on specific issues.
The course materials are keyed directly to NSTISSI 4011 including topics such as Hostile Intelligence Service (HOIS), malicious logic, hackers, environmental and technological hazards, disgruntled employees, careless employees, HUMINT, and monitoring
All material on this site is copyright unless otherwise noted.
Please respect the authors rights by requesting permission for use and ensuring proper attribution and credit.