Syllabus for HLS-625
Technology and Information Security
Technology and Information Security covers a wide range of cyber security and technology concepts. War, crime, and terrorism have affected the domains of land, sea, air, and space for decades. As technology has become more pervasive in our society, a fifth domain has become evident: the cyber domain. Traditional crimes and acts of terror have become leveraged with technological capabilities that give criminals and terrorists a greater advantage than before. In addition, this environment makes it more difficult for law enforcement and intelligence agencies to prevent, detect, and prosecute those that commit horrific acts.
This course explores topics in information technology security management. It examines the necessary technical, physical, and administrative controls required to protect information and information systems that are likely to become vulnerable to a cyber attack. Topics within the course include cryptography, disaster recovery, business continuity of operations, network and host security, threats and vulnerabilities, access control, forensics and incident handling, and legal issues involving computers.
Technology and Information Security will examine the following major topics:
After completing this course, you should be able to:
CO1 Explain the fundamentals of effective information system security.
CO2 Demonstrate a knowledge of the basic concepts of cryptography with emphasis on enterprise security framework.
CO3 Discuss forensics investigations, disaster recovery, contingency planning, and incident handling.
CO4 Formulate recommendations for Internet security mitigation management and cyber defense.
CO5 Analyze various security threats and propose solutions.
CO6 Advocate sound reasons for access control.
CO7 Examine cyber threats and vulnerabilities, cyber crime, and cyber terrorism.
CO8 Analyze legal and ethical issues relating to the cyber domain.
CO9 Determine and assess current and emerging cyber threat trends and vulnerabilities.
You will need the following materials to do the work of the course. The required textbook is available from the University’s textbook supplier, MBS Direct.
Technology and Information Security consists of six modules. Modules include an overview, topics, study materials, and activities. Module titles are listed below.
Course objectives covered in this module: CO1, CO4, CO5, CO6, CO7, CO9
Course objectives covered in this module: CO1, CO2, CO4, CO8
Course objectives covered in this module: CO4, CO5, CO7, CO9
Course objectives covered in this module: CO1, CO3, CO4, CO5, CO6
Course objectives covered in this module: CO5, CO6, CO7, CO8, CO9
Course objectives covered in this module: CO1, CO3, CO4, CO5, CO7
For your formal work in the course, you are required to participate in online discussion forums, complete written assignments, complete a PowerPoint assignment, and complete a final project. See below for details.
Consult the Course Calendar for due dates.
You are required to participate in eight graded discussion forums. Discussion forums are on a variety of topics associated with the courses modules. There is also an ungraded but required Introductions Forum in Module 1.
You are required to read and respond to a minimum of two other students; however, you should read all others posts. You are required to make all posts in a scholarly manner citing and referencing all material. APA guidelines are to be followed. At least one reference is needed for each original post. Be sure to answer each prompt fully. An original post must be 250 words or more and a minimum of 100 words for each response. Tell us what you think based on your informed decision and why you think that way. What did your research say?
You are required to write four papers, each of which must be at least 4 full pages of content (1000 words) in length. Your papers will be well-organized, well-written, accurate, and grammatically correct. You will cite all sources and properly document them using APA format. For each written assignment, at least three references must be used.
As part of your Module 5 activities, you are required to prepare a PowerPoint presentation wherein you will design training, which will cover all elements found within the course objectives.
The presentation, which should take the form of a brief orientation-style training course, should be designed for entry-level employees who would not be very familiar with the topic.
The final paper consists of a comprehensive book review of your textbook Cybersecurity and Cyberwar: What Everyone Needs to Know. You are required to write a minimum of 7 full pages of content (1750 to 1925 words), not including the cover, abstract, or reference page. The goal of the final paper is for you to demonstrate mastery of course objectives. APA style must be used throughout.
See the Final Project area of the course for details.
Your grade in the course will be determined as follows:
All activities will receive a numerical grade of 0–100. You will receive a score of 0 for any work not submitted. Your final grade in the course will be a letter grade. Letter grade equivalents for numerical grades are as follows:
To receive credit for the course, you must earn a letter grade of C or higher on the weighted average of all assigned course work (e.g., assignments, discussion postings, projects). Graduate students must maintain a B average overall to remain in good academic standing.
To succeed in this course, take the following first steps:
Consider the following study tips for success:
Thomas Edison State University is committed to maintaining academic quality, excellence, and honesty. The University expects all members of its community to share the commitment to academic integrity, an essential component of a quality academic experience.
Students at Thomas Edison State University are expected to exhibit the highest level of academic citizenship. In particular, students are expected to read and follow all policies, procedures, and program information guidelines contained in publications; pursue their learning goals with honesty and integrity; demonstrate that they are progressing satisfactorily and in a timely fashion by meeting course deadlines and following outlined procedures; observe a code of mutual respect in dealing with mentors, staff, and other students; behave in a manner consistent with the standards and codes of the profession in which they are practicing; keep official records updated regarding changes in name, address, telephone number, or e-mail address; and meet financial obligations in a timely manner. Students not practicing good academic citizenship may be subject to disciplinary action including suspension, dismissal, or financial holds on records.
All members of the University community are responsible for reviewing the Academic Code of Conduct Policy in the University Catalog and online at www.tesu.edu.
Thomas Edison State University expects all of its students to approach their education with academic integrity—the pursuit of scholarly activity free from fraud and deception. All mentors and administrative staff members at the University insist on strict standards of academic honesty in all courses. Academic dishonesty undermines this objective. Academic dishonesty can take the following forms:
Thomas Edison State University is committed to helping students understand the seriousness of plagiarism, which is defined as using the work and ideas of others without proper citation. The University takes a strong stance against plagiarism, and students found to be plagiarizing are subject to discipline under the academic code of conduct policy.
If you copy phrases, sentences, paragraphs, or whole documents word-for-word—or if you paraphrase by changing a word here and there—without identifying the author, or without identifying it as a direct quote, then you are plagiarizing. Please keep in mind that this type of identification applies to Internet sources as well as to print-based sources. Copying and pasting from the Internet, without using quotation marks and without acknowledging sources, constitutes plagiarism. (For information about how to cite Internet sources, see Online Student Handbook > Academic Standards > Citing Sources.)
Accidentally copying the words and ideas of another writer does not excuse the charge of plagiarism. It is easy to jot down notes and ideas from many sources and then write your own paper without knowing which words are your own and which are someone else’s. It is more difficult to keep track of each and every source. However, the conscientious writer who wishes to avoid plagiarizing never fails to keep careful track of sources.
Always be aware that if you write without acknowledging the sources of your ideas, you run the risk of being charged with plagiarism.
Clearly, plagiarism, no matter the degree of intent to deceive, defeats the purpose of education. If you plagiarize deliberately, you are not educating yourself, and you are wasting your time on courses meant to improve your skills. If you plagiarize through carelessness, you are deceiving yourself.
For examples of unintentional plagiarism, advice on when to quote and when to paraphrase, and information about writing assistance and originality report checking, click the links provided below.
Examples of Unintentional Plagiarism
When to Quote and When to Paraphrase
Writing Assistance at Smarthinking
Originality Report Checking at Turnitin
Acts of both intentional and unintentional plagiarism violate the Academic Code of Conduct.
If an incident of plagiarism is an isolated minor oversight or an obvious result of ignorance of proper citation requirements, the mentor may handle the matter as a learning exercise. Appropriate consequences may include the completion of tutorials, assignment rewrites, or any other reasonable learning tool in addition to a lower grade for the assignment or course. The mentor will notify the student and appropriate dean of the consequence by e-mail.
If the plagiarism appears intentional and/or is more than an isolated incident, the mentor will refer the matter to the appropriate dean, who will gather information about the violation(s) from the mentor and student, as necessary. The dean will review the matter and notify the student in writing of the specifics of the charge and the sanction to be imposed.
Possible sanctions include:
Copyright © 2017 by Thomas Edison State University. All rights reserved.