Introduction to CIS 4680: Introduction to Information Security and ...

Introduction to CIS 4680: Introduction to Information Security and ... Introduction to CIS 4680: Introduction to Information Security and ...

www3.cis.gsu.edu
from www3.cis.gsu.edu More from this publisher
09.03.2015 Views

Course Objectives • Course Syllabus http://www3.cis.gsu.edu/cstucke/cis4680/CIS4680IntroductiontoSecurityandPrivacyFall2010.htm • Objectives: What information security and privacy are? Stakeholders. Nature of the environment and threats Countermeasures Policies and practices for information security and privacy Threat scenario recognition and analysis Business Continuity Planning Risk analysis Related laws, standards, d and codes of practice The National Critical Infrastructure

Groups • Group Formation (http://www3.cis.gsu.edu/cstucke/common/Team%20Dynamics_4up.pdf ) • 3-4 people per group (form these today or in the next 7 days) • Group work: Session participation Security Issues Term Paper

Course Objectives<br />

• Course Syllabus<br />

http://www3.cis.gsu.edu/cstucke/cis<strong>4680</strong>/<strong>CIS</strong><strong>4680</strong><strong>Introduction</strong><strong>to</strong><strong>Security</strong><strong>and</strong>PrivacyFall2010.htm<br />

• Objectives:<br />

What information security <strong>and</strong> privacy are? Stakeholders.<br />

Nature of the environment <strong>and</strong> threats<br />

Countermeasures<br />

Policies <strong>and</strong> practices for information security <strong>and</strong> privacy<br />

Threat scenario recognition <strong>and</strong> analysis<br />

Business Continuity Planning<br />

Risk analysis<br />

Related laws, st<strong>and</strong>ards, d <strong>and</strong> codes of practice<br />

The National Critical Infrastructure

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!