Intro to Voice and Data Security IS 6303 MW 7:30 8:45 p.m., HSS JPL 03.03.18 Course Syllabus

oklahomaflockΑσφάλεια

3 Νοε 2013 (πριν από 4 χρόνια και 6 μέρες)

106 εμφανίσεις

Intro to Voice and Data Security

IS 6303

MW 7:30


8:4
5 p.m.,
HSS JPL 03.03.1
8

Course Syllabus


Master of Business Administration
:

Students will



Be able to apply business and economic concepts and principles to a broad range of organizational and
corporate decision problems, from both a theoretical and an objective, real
-
world viewpoint.



Be knowledgeable of fundamental business and economic concepts, principles and theories, and apply them in
terms of understanding the competitive forces facing a f
irm, assessing the attractiveness of various industries,
and identifying potential sources of competitive advantage and disadvantage of firms.



Be proficient at using quantitative methods and associated research techniques to identify and analyze business
i
ssues and policies within theoretical and practical contexts.



Be knowledgeable of the ethical and other leadership issues facing business organizations, and have an
appreciation of the various leadership roles and social responsibilities of the players in
a business environment.


Description

It has been said that protecting computer systems and networks is much harder than attacking them because the
intruder only has to find one hole in the security perimeter while the security administrator has to find the
m all. This
course will provide the student the opportunity to learn about the basic elements of Information Assurance
(IA)

as it
applies to Voice and Data Security.
Class examples will focus on how IA is critical to current business processes.


COURSE OB
JECTIVES SUPPORTING B.B.A. PROGRAM GOALS
:




Complete
five
labs that show proficiency in using security applications related current business technologies



Complete
a
paper

that demonstrate
s

the students ability to synthesize security and business related iss
ues



Successfully complete two exams that show the students understand the basics of voice and data security


Assumed Background

A

basic understanding of Operating Systems and Networks
,

access to the Internet
,

and a
personal computer
.


Textbook

The required

textbook that will be used for this class is:

Computer Security Handbook, 4ed,
by Bosworth and
Kabay, ISBN 0
-
471
-
41258
-
9


Graded Assignments

The grades for this course will be based on a standard 70% = C, 80% = B, 90%=A grading scheme. The final grades
will be based on the following assignments:



Paper






5
0

points

Labs





50
0

points

Exams





2
00 points


Final Exam




250 points





TOTAL

1000 points


Instructor Data

I
n
structor:
Robert J. Kaufman
,
robert.kaufman@utsa.edu


Office hours
:
MW
7
:
1
5



7
:3
0,
after 8:4
5pm,
or by
appointment.


Misc. Policies
:

A student missing class is responsible for obtaining information missed. Any late penalties for assignments will be
outlined in the individual assig
nment handout. Please ensure pagers and cell phones are turned off during class


exceptions for unusual circumstances should be arranged in advance with the instructor. Any other special
considerations for assignments or examinations should be cleared i
n advance with the instructor.


IS
-
6303

Class Schedule


1

Course Introduction, Introduction to Security (Chap. 1,3)

2

Networks, TCP/IP, and Network
-
Based attacks (Chap 18)


3

Telco Basics, Convergence and Total Network Connectivity


4

Crime, Security and

the Law, Forensics (Chap 2,4,6,34)

5

Business Careers Week Seminars

6

Information and Cyber Warfare (Chap 7)

7

Information Hiding: Cryptography and Steganography (Chap 23, 50)


8

Firewalls and Modem Security (Chap 20)







9

Securing your Voice and Voice over Network Assets

10

Malicious and Mobile Code (Chap 9, 10, 24)


1
1

Wireless and Broadband Net Access and Security



12


*
*** Exam 1****

13

Identification and Authentication (Chap 16)

14

Scanning, Sniffing, spoofing, and
man
-
in
-
the
-
middle attacks


15

E
-
Commerce and Web Security (Chap 13,19,22)




16

Denial of Service Attacks (Chap 11)

17

Monitoring, Logs, and Intrusion Detection Systems (Chap 37,38)

18

Incident Response, BCP, DRP, Backups (Chap 40
-

43)

19

Auditing and Ass
essments (Chap 36, 37)

20

Government Regulations (Chap 49)

2
1

Risk Management (Chap 47)

22


**** Exam 2****

23

Security Policies (Chap 28, 31, 33, 35, 46)




24

Security Certifications and Building a secure system (Chap 25,27)

25

Ethics and Privacy in Cyb
erspace (Chap 30, 51, 52, 53)

26

Securing the Critical Infrastructures, Security Exercises (Chap 14)

27

Where to go to get information and Future Security Issues (Chap 54)

28

Course Review








29

Case Study I








30

Case Study II

FINAL


















The University of Texas at San Antonio is a community of scholars, where
integrity, excellence, inclusiveness, respect, collaboration, and innovation are
fostered.



As a Roadrunner,


I will:


Uphold the highest standards of academic and personal inte
grity by practicing
and expecting fair and ethical conduct;


Respect and accept individual differences, recognizing the inherent dignity of
each person;


Contribute to campus life and the larger community through my active
engagement; and


Support the
fearless exploration of dreams and ideas in the advancement of
ingenuity, creativity, and discovery.


Guided by these principles now and forever, I am a Roadrunner!




The University of Texas at San Antonio Academic Honor Code


A.

Preamble

The University
of Texas at San Antonio community of past, present and future students, faculty, staff, and
administrators share a commitment to integrity and the ethical pursuit of knowledge. We honor the
traditions of our university by conducting ourselves with a stead
fast duty to honor, courage, and virtue in
all matters both public and private. By choosing integrity and responsibility, we promote personal growth,
success, and lifelong learning for the advancement of ourselves, our university, and our community.


B.

H
onor Pledge

In support of the ideals of integrity, the students of the University of Texas at San Antonio pledge:


“As a UTSA Roadrunner I live with honor and integrity.”


C.

Shared responsibility

The University of Texas at San Antonio community shares the

responsibility and commitment to integrity
and the ethical pursuit of knowledge and adheres to the UTSA Honor Code.