Course Description
The course will focus on security policies that can be used to help protect and maintain a network, such as password policy, e-mail policy and Internet policy. Topics also include organizational behavior and crisis management. (3 credits)
Prerequisite
- ITE 145: Fundamentals of Information Systems Security OR CSS 101 Cybersecurity Fundamentals
Student Learning Outcomes (SLOs)
Students who successfully complete this course will be able to:
- Identify the role of an information systems security (ISS) policy framework in overcoming business challenges.
- Recognize the relationship between business drivers and information systems security policies.
- Understand the relationship between regulatory compliance requirements and information system security policies.
- Explain how security policies help mitigate risks and support business processes in various domains of a typical IT infrastructure.
- Explain issues related to security policy implementations and the keys to success.
- Describe the components and basic requirements for creating a security policy framework.
- Describe how to design, organize, implement, and maintain IT security policies.
- Describe the different methods, roles, responsibilities, and accountabilities of personnel, along with the governance and compliance of a security policy framework.
- Describe the different ISS policies associated with the user domain.
- Describe the different ISS policies associated with the IT infrastructure.
- Describe the different ISS policies associated with risk management.
- Describe the different ISS policies associated with incident response teams (IRTs).
- Describe issues related to implementing ISS policies.
- Describe issues related to enforcing ISS policies.
- Describe the different issues related to defining, tracking, monitoring, reporting, automating, and organizing compliance systems and emerging technologies.
Course Activities and Grading
Assignments | Weight |
---|---|
Discussions | 10% |
Lab Assignments/Quizzes | 20% |
Written Assignments | 20% |
Project | 25% |
Final Exam | 25% |
Total | 100% |
Required Textbooks
Available through Charter Oak State College's Book Bundle
- Jones & Bartlett (2021). Navigate 2 Ebook Access for Security Policies and Implentation Issues. Burlington, MA: Jones & Bartlett. ISBN-13: 978-1-284-20004-1
Course Schedule
Week | SLOs | Readings and Exercises | Assignments |
1 | 1,2 | Topic: Information Systems Security Policy Management and Business Drivers
|
|
2 | 2,3 | Topics: Compliance Laws and Business Challenges
|
|
3 | 3,4,5 | Topics: IT Security Policy Implementation Issues and Frameworks
|
|
4 | 6,7,8 | Topics: Managing IT Security Policies, and Policy Framework Approaches
|
|
5 | 7,8,9 | Topics: User Domain and IT Infrastructure Security Policies
|
|
6 | 9,10,11,12 | Topics: Data Classification and Handling and Incident Response Team Policies
|
|
7 | 5, 13,14 | Topics: IT Security Policy Implementation and Enforcement, Compliance Systems and Emerging Technologies
|
|
8 | 1-15 | Topics: IT Policy Compliance and Compliance Technologies, Course Review and Final Exam
|
|
05182021
COSC Accessibility Statement
Charter Oak State College encourages students with disabilities, including non-visible disabilities such as chronic diseases, learning disabilities, head injury, attention deficit/hyperactive disorder, or psychiatric disabilities, to discuss appropriate accommodations with the Office of Accessibility Services at OAS@charteroak.edu.
COSC Policies, Course Policies, Academic Support Services and Resources
Students are responsible for knowing all Charter Oak State College (COSC) institutional policies, course-specific policies, procedures, and available academic support services and resources. Please see COSC Policies for COSC institutional policies, and see also specific policies related to this course. See COSC Resources for information regarding available academic support services and resources.