Introduction to CIS 4680: Introduction to Information Security and ...
Introduction to CIS 4680: Introduction to Information Security and ... Introduction to CIS 4680: Introduction to Information Security and ...
Course Objectives • Course Syllabus http://www3.cis.gsu.edu/cstucke/cis4680/CIS4680IntroductiontoSecurityandPrivacyFall2010.htm • Objectives: What information security and privacy are? Stakeholders. Nature of the environment and threats Countermeasures Policies and practices for information security and privacy Threat scenario recognition and analysis Business Continuity Planning Risk analysis Related laws, standards, d and codes of practice The National Critical Infrastructure
Groups • Group Formation (http://www3.cis.gsu.edu/cstucke/common/Team%20Dynamics_4up.pdf ) • 3-4 people per group (form these today or in the next 7 days) • Group work: Session participation Security Issues Term Paper
- Page 1: Introduction to CIS 4680: Introduct
- Page 5 and 6: Conduct of the Course • Use CIS46
- Page 7 and 8: Conduct of the Course: Login vClass
- Page 9 and 10: Conduct of the Course: The day and
- Page 11 and 12: Connection Speed • Set your Conne
- Page 13 and 14: Audio • Permission for Using Micr
- Page 15 and 16: Whiteboard Tools • Permission for
- Page 17 and 18: Conduct of the Course: Participant
- Page 19 and 20: Conduct of the Course: vClass Visit
- Page 21 and 22: Course Materials • Course Materia
- Page 23 and 24: Peer Evaluation • Done at mid-ter
- Page 25: Q&A
Course Objectives<br />
• Course Syllabus<br />
http://www3.cis.gsu.edu/cstucke/cis<strong>4680</strong>/<strong>CIS</strong><strong>4680</strong><strong>Introduction</strong><strong>to</strong><strong>Security</strong><strong>and</strong>PrivacyFall2010.htm<br />
• Objectives:<br />
What information security <strong>and</strong> privacy are? Stakeholders.<br />
Nature of the environment <strong>and</strong> threats<br />
Countermeasures<br />
Policies <strong>and</strong> practices for information security <strong>and</strong> privacy<br />
Threat scenario recognition <strong>and</strong> analysis<br />
Business Continuity Planning<br />
Risk analysis<br />
Related laws, st<strong>and</strong>ards, d <strong>and</strong> codes of practice<br />
The National Critical Infrastructure