Course Objectives A strong grounding in computer and network security. Learn the factors related to the plan-protect-respond cycle of IT security. An.

Slides:



Advertisements
Similar presentations
Collaborative e-Portfolios
Advertisements

MY NCBI (module 4.5). MODULE 4.5 PubMed/How to Use MY NCBI Instructions - This part of the: course is a PowerPoint demonstration intended to introduce.
Microsoft ® Office OneNote ® 2007 Training Using your Notebook to its fullest potential Kent School District presents:
SAM 2010 v2.0 Coming June Assessment & Training Assessment: test, quiz, homework Training: learn by reading, watching, or doing Assignments are.
Getting Started with Moodle Bronze Level – Compulsory.
Studying for N5 and N4 English ENGLISH DEPARTMENT Prestwick Academy Mrs Hay.
Slide 01-1COMP 7370, Auburn University COMP 7370 Advanced Computer and Network Security Dr. Xiao Qin Auburn University
Course Objectives A strong grounding in computer and network security. Learn the factors related to the plan-protect-respond cycle of IT security. An.
Course Objectives A strong grounding in computer and network security. Learn the factors related to the plan-protect-respond cycle of IT security. An.
Welcome to MAT 170. Basic Course Information Instructor Office Office Hours Beth Jones PSA 725 Wednesday and Friday 10:40 am – 11:30 am and by appointment.
Welcome to MAT 170. Basic Course Information Instructor Office Office Hours Beth Jones PSA 725 Tuesday and Thursday 8 am – 8:30 am Tuesday and Thursday.
Computer Networks CS Topics F Background F Admin Stuff F Motivation F Objectives.
Welcome to CS 395/495 Measurement and Analysis of Online Social Networks.
What to Expect Learning the concepts of AIS “Teachers open the door. You enter by yourself” (old Chinese proverb) Applying the concepts (Group Case) “What.
Chapter 4 Designing Significant Learning Experiences II: Shaping the Experience.
Presented by Chad Kafka This Month’s Topic: Wikispaces Advanced Today’s session is an introduction to what a WIKI is and how they can be used in education.
Your User Name is the first portion of your Carleton Connect account eg. mroger4 if the was n.ca
MyMathLab How to Study Hints from Professor of Mathematics Jon Odell.
CS 150 PERSONAL PRODUCTIVITY USING TECHNOLOGY Instructor: Xenia Mountrouidou.
What to Expect Learning the concepts of AIS “Teachers open the door. You enter by yourself” (old Chinese proverb) Applying the concepts (Group Case) “What.
Google Classroom.
Course - DT249/1 Subject - Information Systems in Organisations COURSE SUBJECT OVERVIEW Semester 1, Week 1.
LIB5190 Critical Evaluation of Library Media for Children.
Course Settings MOODLE. Getting Started This is a quick start guide to Setting up a Moodle Course. This part of the course documents and outlines:- Course.
Humanities 1 Syllabus Professor Robert Cannon Web: robertleecannon.com Spring 2010 Classroom: CC 208 TH 6:45-9:55 pm 3 units.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Unit 4 IT 484 Networking Security Course Name – IT Networking Security 1203C Term Instructor.
ACG 2021 Financial Accounting Introduction Syllabus Highlights WebCT, Second Life, Cmap, Meebo, Twitter.
Creating a Digital Classroom. * Introduction * The Student Experience * Schoology’s Features * Create a Course & Experiment.
© 2007 Pearson Education, Inc. publishing as Longman Publishers. Chapter 1: Student Success Breaking Through: College Reading, 8/e by Brenda Smith.
Course Materials Management System And The New Student Portal.
The Writing Algoma University Marissa Ross, Instructor.
{ International Baccalaureate ® Economics (SL) Mr. Rich Blanc Room B115.
Writing for Proficiency with Georgie Ziff. English 3000 is a course to help you meet the University Writing Skills Requirement. You must submit a Final.
Where are you joining us from
What else is there? CMPT 454: Database Systems II. – Transaction Management. – Query Planning. – Optional topics, e.g. data mining, information retrieval,
Welcome to EECS 395/495 Networking Problems in Cloud Computing.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Welcome to Introduction to Network Security! Course Name – IT Introduction to Network Security.
Wendy Edney, Ed.D. NCDPI Regional Coordinator, Western Region Western NC CTE Honors Workshop May 2, 2012.
Welcome To MOODLE Getting Started. Introductions Christa McLaughlin – High School math teacher and high school lead teacher of technology Jason Grubbs.
1. Internet usage Comp5001-Computer Skills advanced Lecture 3: 2.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Welcome to Introduction to Network Security! Course Name – IT Introduction to Network Security.
MAT 279 Data Communication and the Internet Prof. Shamik Sengupta Office New Building
What to Expect Learning the concepts of AIS “Teachers open the door. You enter by yourself” (old Chinese proverb) Applying the concepts (Group Case) “What.
Course Objectives A strong grounding in computer and network security. Learn the factors related to the plan-protect-respond cycle of IT security. An.
Course Objectives Gain a strong grounding in computer and network security. Learn the factors related to the plan-protect-respond cycle of IT security.
Lecture 1 Page 1 CS 236 Online Introduction CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
This will be an interactive class, prepare to participate!!!
ACG 4401 Accounting Information Systems Introduction Syllabus Highlights.
Course Objectives A strong grounding in computer and network security. Learn the factors related to the plan-protect-respond cycle of IT security. An.
Course Objectives Gain a strong grounding in computer and network security. Learn the factors related to the plan-protect-respond cycle of IT security.
Google Docs An introduction to Google Docs. Session Objectives Participants will become familiar with the various applications available within Google.
MAT 279 Data Communication and the Internet Prof. Shamik Sengupta Office 4210 N Fall 2010.
CREATE, IMPLEMENT AND ENJOY! Blogs,Wikis & RSS Readers.
Research Experience Program (REP) Fall 2007 Psychology 100 Ψ.
Welcome to Accounting II Professor Kris Friestad Unit 1 Seminar.
Introduction Moodle is a course management system, designed to help teachers create online courses and manage virtual interactions with their students.
Course Overview Stephen M. Thebaut, Ph.D. University of Florida Software Engineering.
 In My.Wartburg you can…  Facilitate Class Discussions  Allow students to research topics, reflect, and all students contribute  Learning Teams 
Financial Management of ECE Programs.  Go to “Tools”  Click on “Personal Information” to edit your personal information (including address) or.
Course Overview 1 MAT 279 Data Communication and the Internet Prof. Shamik Sengupta Office 4210 N
Welcome to MT140 Introduction to Management Unit 1 Seminar – Introduction to Management.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Welcome to Introduction to Network Security! Course Name – IT Introduction to Network Security.
CET4884 Dr. Nabeel Yousef.  Dr. Nabeel Yousef  Located at the ATC campus room 107Q  Phone number 
Welcome to EECS 395/495 Networking Problems in Cloud Computing
Advanced Accounting Information Systems Summer 2011
CREATING WIKIS Eled 318.
Advanced Accounting Information Systems Summer 2017
~ How to create a basic website Part II ~
Book Of Choice Final Report
Presentation transcript:

Course Objectives A strong grounding in computer and network security. Learn the factors related to the plan-protect-respond cycle of IT security. An understanding of networking concepts. You will learn of the importance of IT security to the accounting profession and of the various control frameworks that accountant's rely on for SOX compliance. This course is learning about defense so we will learn about many threats and how they exploit vulnerabilities but we will NOT be using these exploits in class. 2

Syllabus Highlights Dr. Steven Hornik Course Webpage: Office Hours: Tuesday 12:30 – 1:30 Thursday 4:30 – 5:45 ; and by appointment Office: BA1 432

Text Book Corporate Computer and Network Security, 2 nd Edition by Raymond R. Panko

Grade Components Exam 1 (Ch )*250 Exam 2 (Ch. 5- 9)250 Access Control Simulation100 Discussions100 Research Paper200 Research Paper – Presentation 50 Total Points950

Grading Scale A A B B B C C C D D D F 0.00 <59

Exams Two Part Exams 1 st Part Multiple choice Matching 2 nd Part Short-answer / Essay (with Notes/Book)

WikiSpace Invitation or Click “Join” button Join if you haven’t Collaborative Web Pages You can Add material to any page You can Edit material already posted to a page You can Delete material posted to a page You can Create a new page with new material Material text content Hyperlinks WebPages, Podcasts, Video, Audio, etc. Group Research/Project Paper Each group will have its own Team page(s) for supporting collaborative work.

Wiki Pages to Update Security in the News

Research/Project Paper Groups of 3 Group Assessment page final paper Dates: Initial Title (1 sentence) – 02/09/2012 Summary idea (1 page + group assessment rubric) 02/16/2012 Draft – 5 page minimum - 03/01/2012 Final paper – 04/05/2012 Presentations – 04/12 to 4/19/2012 Topics (only 2 groups can do the same topic) Using OCTAVE Allegro, create an risk assessment, using the OCTAVE Allegro worksheets, for an organization you work for or have access to. Identifying between 5-7 critical information assets. Beyond the risk assessment this project requires a summary of how risk assessment fits within the IT Governance frameworks.Describe COSO's ERM Framework (2004), Key Risk Indicators (2010). Using material from our book and website determine a set of KRI's that could be useful in anticipating IT Security exploits, i.e. can we scan our internal/external environment for possible increased risk so that we can react to it beforehand? Before proceeding with this project you will need to discuss the number of exploits to be examined. Using the various standards/frameworks, COBIT, ISO, ITIL, etc. create a report of the similarities between them and come up with a list of common controls, i.e. create a grand unified control document. The paper should include summaries of each of the frameworks included and a compare/contrast section. Research and prepare a report on the compliance issues related to SOX and IT Security. In-depth analysis of a current topic related to accounting and IT-Security (e.g. cloud computing). 10