Introduction to Acct 8680 / CIS 8080: Information Security and Privacy

Slides:



Advertisements
Similar presentations
D2L Orientation The Sociology of Aging GERON 300 or FCS 330 or SOC Sacramento City College- Jo-Ann Foley.
Advertisements

Need your MyMathLab card with your access code Need a Valid Address Need to know Purdue’s zip code is and your course ID for your Class You.
Need your MyMathLab card with your access code Need a Valid Address Need to know Purdue’s zip code is and your course ID for your Class You.
Need your MyMathLab card with your access code Need a Valid Address Need to know Purdue’s zip code is and your course ID for your Class You.
©2001 Chariot Software Group Using MicroGrade Classroom Management Software.
Introduction to WebCT Sheridan College Architectural Technology.
Microsoft Live Meeting Overview Angela Carter, Presenter.
Introduction to PDE Webinars July Prepare for Your First Webinar Note: You may need help from technical support and/or your network guru. 1. Connect.
Induction Presentation Susan McLean-Orlando MEd Left click Mouse to advance – Press backspace to go back Best viewed using Internet Explorer © Susan McLean-Orlando.
P ROFESSIONALS IN S URETY B ONDING Presented by: Charnita Lee, Professional Development December 10, 2014 N ATIONAL A SSOCIATION O F S URETY B OND P RODUCERS.
PowerPoint 2003 – Level 1 Computer Concepts Cathy Horwitz April 25, 2011.
Steps 2 & 3 Presenter:. Training Overview Introduction Walk Through Steps 2 & 3 Username & passwords Team Requirements Scheduled FET Trainings & Completion.
Business 70 Introduction to eCommerce On Line Distance Learning.
Registering for MasteringPhysics TM
Online Collaborative Tools using Google and Google +
TTE 350 Lecture Notes for 2/2/01. Agenda Nuts and Bolts Overview of Courseware WebCT Demo.
Introduction to Computer Applications MIS105 Introductory Session Instructor: Irfan Ilyas.
CTER Orientation Tutorial The Use of the WebBoard.
LiveText is an… Online Work Environment and…YOUR Digital Notebook! No More Lost Paper Assignments!
← Select Exchange Once logged in. ↓ click Join Course Icon.
FALL 2011 TECHNICAL ORIENTATION. Session starts at 11:00 am We’ll be online shortly Speaker test starts about 10:45 To ask questions, use the chat window.
WebCT: Managing Students and Communicating FITC Staff.
Introduction to CIS 8082: Security of Networked Information Systems Course Objectives (this is an experimental course) Group Formation and Function Conduct.
Introduction to the Course Farrokh Alemi, Ph.D.. This course provides a managerial perspective on the effective use of data and information technology.
Introduction to CIS 4680: Introduction to Information Security and Privacy Course Objectives Group Formation and Function Conduct of the Course Exams Course.
Registering for MasteringChemistry TM
Registering for MasteringEngineering TM
1 Improved Access to EPA and Interagency Information: Before and After with Web 2.0 – Part 7 EPA Jam on Improved Access to Environmental Information, June.
Registering for MasteringAstronomy TM
Registering for MasteringBiology TM
1 Sacramento City College- Jo-Ann Foley D2L Orientation.
AZGLA.COM Statistics & Game ResultsTutorial Available for download at By Andrew Kay.
Technical Orientation Summer Technical Orientation  Session starts at 11:00 am  We’ll be online shortly  Speaker test starts about 10:45  To.
ABI Gradebooks Elementary 9/5/2007. The names below are real, but the data is not.
Introduction to CIS 4680: Introduction to Information Security and Privacy Course Objectives Group Formation and Function Conduct of the Course Exams Course.
Introduction to the Course Farrokh Alemi, Ph.D.. This course provides a graduate level managerial perspective on the effective use of data and information.
Registering for Virtual Labs™
D2L Orientation Marriage and the Family FCS 320 or SOC Sacramento City College- Jo-Ann Foley.
An Orientation to HSPnet: How to Access the Evaluation Module (ACP) McMaster Physiotherapy Program Clinical Education Feb 2016.
FEDERAL TAX AB256 Professor Ron Hathaway. WELCOME Introductions contact information: Ron Hathaway (c) AIM: DiverRescue4.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
BACK NEXT YOUR PROGRESS CC HOSTING A WEBEX FOR INSTRUCTION CPCC WebEx Training BACK NEXT YOUR PROGRESS CC.
Govt Fall – 2011 Accelerated 10 Week Online Course.
Welcome to ADREG (Admission and Registration System) Workshop
First Day of Class First Day of Class Student Registration Guide
Using to Create Web Conference Professional Development
An introduction to developing and teaching an online course
Kidblog Date and Time Presenter Name
Welcome to the Nevada Test Administration Training and Q&A Session
Arab Open University (AOU)
WEB 1700 General Education Course: Micro-Computer Applications
CMGT 556 OUTLET Lessons in Excellence--cmgt556outlet.com.
Review of Online Course
Adobe Connect: Web Conferencing, Collaboration, and Teaching Online
Teaching with Moodle at Lapel High School
Children’s Health, Safety and Nutrition
Issaquah Online Learning Apex
Introduction to Acct 8680 / CIS 8080: Information Security and Privacy
Anderson Online DJT/SLB/DFM.
Introduction to Acct 8680 / CIS 8080: Information Security and Privacy
Marriage and the Family FCS 320 or SOC 310
Topics in Applied Microbiology
Registering for MasteringPhysicsTM
Registering for MasteringChemistryTM
BB LEARN ORIENTATION ENGLISH 102 Advanced Composition
Skype For Business Introduction
Topics in Applied Microbiology
Burnaby Central Numeracy Morning
Navigating NEIU Blackboard 417 – 418a
Presentation transcript:

Introduction to Acct 8680 / CIS 8080: Information Security and Privacy Course Objectives Group Formation and Function Conduct of the Course Exams Course Materials Grading Peer Evaluation How to succeed in this course

Course Objectives Course Syllabus http://cis.gsu.edu/~cstucke/cis8680/8680syls2005.htm Objectives: What information security and privacy are? Stakeholders. Nature of the environment and threats Countermeasures Policies and practices for information security and privacy Threat scenario creation and analysis Business Continuity Planning Risk analysis Related laws, standards, and codes of practice

Groups Group Formation (http://cis.gsu.edu/~cstucke/cis8680/content/teamdyn.pdf ) 3-4 people per group (form these before 10/25) Each session select a designated group spokesperson Group work: Session participation Security and Privacy Policy Study Security Issues Term Paper

Conduct of the Course vClass WebCT Vista Microsoft Conferencing Server Invited speakers (still changing) Chat etiquette Sample session schedule: 4:30-4:40 Action Items from last session 4:40-5:50 Speaker/Instructor led session 5:50-6:00 Break 6:00-6:25 Group: develop & post case analysis 6:25-6:40 Group: analyze & rate other analyses 6:40-7:00 Groups present ratings

Conduct of the Course: WebCT Vista Enter CIS8080 WebCT site Use for Exams, Bulletin Board, out of class chats, mail, group project postings, and more

Conduct of the Course: vClass Login vClass http://www.elluminate.com/member.jsp (screen shots follow) Join CIS 8080 & ACCT 8680 - STUCKE Chat etiquette 1. Group spokesperson does posting in chat 2. No more than 3-4 outstanding questions at a time 3. When you want to respond to a comment made earlier but don't want the comment assumed to be part of the current discussion, preface your comment with "re subject" or "re author:" 4. When you want to indicate that you have more to say on the subject, end your comment with "...". vClass info at http://www.gsu.edu/~wwwets/instructionalsupport/vclass/participants/index.html

Conduct of the Course: Login vClass Login vClass at http://www.elluminate.com/member.jsp

Conduct of the Course: Join CIS 8680 & ACCT 8680 - STUCKE

Conduct of the Course: Participant Screen http://www. gsu

Conduct of the Course: WebCT Session Objectives Links to chats for replay Individual group (presentation group) areas Bulletin Board Mail Other facilities shown on home page

Conduct of the Course: vClass You will find some useful demo sessions at https://www.elluminate.com/support/docs/learn_about_elluminate.jsp In particular, check out: Participant Orientation (5 minutes) Using Breakout Rooms (8 minutes) Loading Whiteboard Content (5 minutes) Using the Whiteboard Screen Explorer (3 minutes)

Conduct of the Course: MCS Microsoft Conferencing Server http://hooch.cis.gsu.edu/conferencing/default.asp?select=2 Used when speakers wish audio and/or video Is our backup chat location if WebCT is down Be sure you can enter and participate in the audio/video conference

Exams Mid-term and Final Exams On-line using WebCT Open notes and course materials No other help (direct or indirect during exam period) Samples of exam format

Course Materials Course Materials at http://cis.gsu.edu/~cstucke/cis8680/content/ Username and Password required (I’ll give you these in the first session.) Materials subject to change during course Finding better materials is participation plus (post these on the WebCT bulletin board)

Grading The syllabus is the official document for all course information Individual Exams are each 20% of final grade Group Security Issues Term Paper is 20% Group Security & Privacy Policy Study is 20% Group participation is 20% Individual scores for group work are the group score * peer evaluation

Peer Evaluation Done at mid-term and end of course The mid-term score is informational The end-of-course score is used in grade calculation The peer evaluation can make letter grade differences in your final grade Be a strong team player Give honest feedback. Do not surprise anyone with their end-of-course peer evaluation http://cis.gsu.edu/~cstucke/cis8680/PeerEvaluation8680.htm

How to Succeed in this Course Study schedule-linked materials before sessions Actively participate as a group both in sessions (observing class etiquette) & in posting materials Produce group studies, papers, and presentations that exceed requirements and the previous classes’ products Carry your part of the group’s work Excel on exams (especially scenarios) by understanding course concepts and their application

Q&A