Presentation is loading. Please wait.

Presentation is loading. Please wait.

Course Objectives A strong grounding in computer and network security. Learn the factors related to the plan-protect-respond cycle of IT security. An.

Similar presentations


Presentation on theme: "Course Objectives A strong grounding in computer and network security. Learn the factors related to the plan-protect-respond cycle of IT security. An."— Presentation transcript:

1

2 Course Objectives A strong grounding in computer and network security. Learn the factors related to the plan-protect-respond cycle of IT security. An understanding of networking concepts. You will learn of the importance of IT security to the accounting profession and of the various control frameworks that accountant's rely on for SOX compliance. This course is learning about defense so we will learn about many threats and how they exploit vulnerabilities but we will NOT be using these exploits in class. 2

3 Syllabus Highlights Dr. Steven Hornik email: shornik@bus.ucf.edushornik@bus.ucf.edu Course Webpage: http://acg6415.wikispaces.com/http://acg6415.wikispaces.com/ Office Hours: Tuesday & Thursday 5:00-6:00 ; and by appointment Office: BA1 432

4 Text Book Corporate Computer and Network Security, 3 rd Edition by Randall J. Boyle and Raymond R. Panko

5 Grade Components Exam 1 (Ch. 1 – 4, module A)250 Exam 2 (Ch. 5- 9)250 Access Control Simulation100 Security in the News 50 Research Paper200 Total Points850

6 Grading Scale A 4.00 100-93 A- 3.75 92-90 B+ 3.25 89-86 B 3.00 85-83 B- 2.75 82-80 C+ 2.25 79-76 C 2.00 75-73 C- 1.75 72-70 D+ 1.25 69-66 D 1.00 65-63 D- 0.75 62-60 F 0.00 <59

7 Exams Two Part Exams 1 st Part Multiple choice Matching Time Limit 45 – 60 minutes 2 nd Part Short-answer / Essay (with Notes/Book) Time Limit 2 hours Exams can be taken in any order

8 WikiSpace E-mail Invitation or Click “Join” button Join if you haven’t Collaborative Web Pages You can Add material to any page You can Edit material already posted to a page You can Delete material posted to a page You can Create a new page with new material Material text content Hyperlinks WebPages, Podcasts, Video, Audio, etc. Group Research/Project Paper Each group will have its own Team page(s) for supporting collaborative work.

9 Wiki Pages to Update Security in the News

10 Security In The News Locate an article/video, etc. related to a security breach 1.Insert a link to the resource (article, video, etc.) 2.Provide a summary of what happened 3.Detail the breach that occurred 4.Provide a description of what control could have prevented/detected the breach Grading: 2 articles up to 50 points 1 articles up to 40 points Quality counts If you post more than 1 article the type of breach needs to be different in each. No duplicate articles allowed 10

11 Research/Project Paper Groups of 5 Group Assessment 10 page final paper Dates: Initial Title (1 sentence) – 05/04/2012 Summary idea (1 page + group assessment rubric) 05/13/2012 Draft – 5 page minimum – 06/19/2012 Final paper – 07/05/2012 Topics (only 2 groups can do the same topic) Using OCTAVE Allegro, create an risk assessment, using the OCTAVE Allegro worksheets, for an organization you work for or have access to. Identifying between 5-7 critical information assets. Beyond the risk assessment this project requires a summary of how risk assessment fits within the IT Governance frameworks Using the various standards/frameworks, COBIT, ISO, ITIL, etc. create a report of the similarities between them and come up with a list of common controls, i.e. create a grand unified control document. The paper should include summaries of each of the frameworks included and a compare/contrast section. Research and prepare a report on the compliance issues related to SOX and IT Security. In-depth analysis of a current topic related to accounting and IT-Security (e.g. cloud computing). 11

12 Access Control Simulation 12

13 Access Control Simulation - Tutorial 13

14 Access Control Simulation 14

15 Access Control - Office 15

16 Access Control Report You have been hired to conduct an IT control review Examine the office locations Each office Each Cubicle Each room Note controls in place Note missing controls Prepare report summarizing your findings Include a table that shows: Place Visited Control found Control Missing Recommended Fix (if necessary) 16


Download ppt "Course Objectives A strong grounding in computer and network security. Learn the factors related to the plan-protect-respond cycle of IT security. An."

Similar presentations


Ads by Google