Download presentation
Presentation is loading. Please wait.
Published byGavin Hopkins Modified over 9 years ago
2
Course Objectives Gain a strong grounding in computer and network security. Learn the factors related to the plan-protect-respond cycle of IT security. Acquire an understanding of networking concepts. Understand the importance of IT security to the accounting profession. This course is learning about defense so we will learn about many threats and how they exploit vulnerabilities but we will NOT be using these exploits in class. 2
3
Syllabus Highlights Dr. Steven Hornik email: shornik@ucf.edushornik@ucf.edu Course Webpage: http://acg6415.wikispaces.com/http://acg6415.wikispaces.com/ Office Hours: Wednesday and Thursday 5:00-6:00 and by appointment Office: BA1 432
4
Text Book Corporate Computer and Network Security, 4th Edition by Randall J. Boyle and Raymond R. Panko
5
Grade Components AssessmentPoint s Exam 1 – Ch 1-4, A Multiple- Choice100 Exam 1 – Ch 1-4, A & Readings - Essay 150 Exam 2 – Ch 5-10 Multiple Choice100 Exam 2 – Ch 5-10 & Readings – Essay150 Access Control Simulation50 Security in the News50 Group Class Presentation50 Participation*50 Total Points700 5 * In Class & FlipBoard
6
Grading Scale A 4.00 100-93 A- 3.75 92-90 B+ 3.25 89-86 B 3.00 85-83 B- 2.75 82-80 C+ 2.25 79-76 C 2.00 75-73 C- 1.75 72-70 D+ 1.25 69-66 D 1.00 65-63 D- 0.75 62-60 F 0.00 <59
7
Exams Two Part Exams 1 st Part Multiple choice Matching Time Limit ~ 75 minutes 2 nd Part Short-answer / Essay (with Notes/Book) Time Limit 3.5 hours Exams can be taken in any order
8
FlipBoard Our Magazine – CyberSecurityCyberSecurity Quick Demo… In Class Discussions (Participation) Security in the News 8
9
Security In The News Locate an article/video, etc. related to a security breach 1.Add an article to our class FlipBoard 2.Provide a summary of what happened 3.Detail the breach that occurred 4.Provide a description of what control could have prevented/detected the breach 5.Quality counts 6.No duplicate articles allowed 9
10
Group Class Presentation Groups of 5, you can select your group members Class presentation addressing the creation of a computer security consulting division. Time Limit: 15 minutes Format: PPT, KeyNote, Prezi, whatever you want…… Grading Content/Delivery of Presentation Hacker Evaluations Instructor Evaluations 10
11
Access Control Simulation 11
12
Access Control Simulation - Tutorial 12
13
Access Control Simulation 13
14
Access Control - Office 14
15
Access Control Report You have been hired to conduct an IT control review Examine the office locations Each office Each Cubicle Each room Note controls in place Note missing controls Prepare report summarizing your findings Include a table that shows: Place Visited Control found Control Missing Recommended Fix (if necessary) 15
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.