Cs4250-Information Systems Security and Control
Cs4250-Information Systems Security and Control
UK LEVEL: 6
UK CREDITS: 15
(Updated Spring 2021) US CREDITS: 3/0/3
RATIONALE: In this course, students are introduced into information systems security
principles and standards as well as in control objectives for information
technology. It also covers concepts, methods, and best practices in securing
information systems. Moreover, this course equips students with sufficient
knowledge to view information systems as organizational assets to be valued and
protected.
LEARNING As a result of taking this course the student, should be able to:
OUTCOMES:
1. Examine the multiple layers of information systems security and controls
in organizations.
2. Analyze the risk management approach to information assets’ security
with respect to operational and organizational goals.
3. Evaluate contingency strategies in respect to the information security
framework in a business context.
METHOD OF In congruence with the learning and teaching strategy of the College, the
TEACHING AND following tools/activities are used:
LEARNING:
➢ Lectures, class discussions of recent information systems’ security best
practices
➢ Office hours held by the instructor to provide further assistance to
students.
➢ Use of the Blackboard Learning platform to further support
communication, by posting lecture notes, assignment instruction, timely
announcements, and online submission of assignments.
ASSESSMENT: Summative:
First Assessment - Midterm
30% Answers to essay questions
Examination
Literature review, data
Final Assessment – Research collection, methodology,
70%
Project interpretation (2,500-2,700
words)
Formative:
Case problems risk, assessment assignments 0%
The formative assessment(s) aim to prepare students for the summative ones.
1
The First Assessment tests Learning Outcomes 1 and 2.
The Final Assessment tests Learning Outcomes 1, 2 and 3.
The final grade for this module will be determined by averaging all summative
assessment grades, based on the predetermined weights for each assessment.
If students pass the comprehensive assessment that tests all Learning Outcomes
for this module and the average grade for the module is 40 or higher, students
are not required to resit any failed assessments.
(Guidelines and assessment rubrics are distributed on the first day of classes
along with the course outline).
RECOMMENDED READING:
Ray Rothrock, R. (2018). Digital Resilience: Is Your Company Ready for the Next
Cyber Threat? AMACOM; First edition, ISBN-10: 0814439241.
SOFTWARE
MS-Office 365 applications
REQUIREMENTS:
2
https://sei.cmu.edu/about/divisions/cert/index.cfm
https://www.enisa.europa.eu/
https://ec.europa.eu/info/law/law-topic/data-protection_en
https://owasp.org/www-project-top-ten/
https://resources.infosecinstitute.com/
http://www.iso27001security.com/html/27033.html
https://www.isaca.org/
https://isc2-chapter.gr/
https://www.giac.org/