INF 741: Security Policies
Office: BA 310b
Hours: M 11:30AM-1:00PM & by appt.
PH: (518) 442-4925
FX (518) 442-2568
Email: [email protected]
|March 19-30, 2007
Available Lab(s)CIFA Teaching Laboratory
ResourcesCourse Website: The course website is located at: http://ecourses.purdue.edu. You must click on "West Lafayette Open Campus" to access the proper site. Click on "Log In" and sign in using the User name and Password assigned to you via email.
Readings: Reference readings will be posted at the end of each presentation. Available readings will be accessible via http://eres.ulib.albany.edu. You must click on "Electronic Reserves & Reserve Pages" and then type in "INF741" in the empty box. Click under the Course Number section (which is hyperlinked) you will be asked to input a password. The password to access this information will be provided via email and is case-sensitive. All of the readings is divided by Unit and contains readings in .pdf format or web links to readings.
Reference Book: Writing Information Security Policies by Scott Barman
COURSE OVERVIEWThis course provides students with an introduction to information security policies. Students will be introduced to sociological and psychological issues in policy implementation in general and then provided a focused dialogue on information security specific policies. The class discusses the entire lifecycle of policy creation and enactment and presents the students with issue specific policies in different domains of security. The structure of the policy is also discussed to assist the students design and modify policies. Several examples from different domains are incorporated in the curriculum to assist the students learn in context of real life situations.
COURSE FORMATThe class is taught in an online format where the students can learn at their own pace. The learning environment is very interactive containing, instructor video, discussion groups, and interactive quizzes. Students learn the basic elements of security policies as well as the process of enacting security policies. It is assumed that the students have a good understanding of risk analysis, which will assist the students in understanding security policies. To illustrate the concepts context is build through use of examples and case studies. Students are expected to use critical thinking skills as they go through the material rather than accepting facts at face value. Even though the course is spread over 2 weeks, it is important that students stay on schedule so that they can participate with other students in discussions. The class should require approximately 40 hours of work. This should work out to roughly 15 hours of video and lecture material, 2 hour worth of quizzes, 4 hours for discussion postings, 12 hours for the final project, and 7 hours of readings.
Each class comprises of theoretical elements as well as case analysis. Please come prepared with the readings since the class will move at a brisk pace. Readings will be announced approximately a week before class. All the information will be posted on this webpage. Students are expected to use critical thinking skills as they go through the material rather than accepting facts at face value.
COURSE PREREQUISITESThe prerequisite or co-requisite is the INF 740: Information Security Risk Assessment course. It is assumed that students will have a general background of computer security. It would be helpful if students have some knowledge of the following topics:
- Computer Networks
- Computer Architecture
- Software Design
- Risk Analysis (assets, threats, vulnerabilities, and controls)
LEARNING OBJECTIVESStudents should be able to:
- Understand the lifecycle of policy enactment
- Create and modify security policies
- Create a dissemination plan for the policy
- Critique the security policy for its effectiveness and completeness
Quizzes- 20% : Please work individually on all quizzes. A quiz will be offered after each Unit is completed through a link.
Discussion Postings- 30% : Even though this is an online course, it is expected that students will be able to learn from each other and participate in a discussion. To promote this, you will be assigned discussion postings. Discussion postings will generally be due on Wednesday and a response to someone else's posting should be up by the Sunday of that week.
Project- 50% : The students will get a project to complete at the end of the class. Students need to complete and submit this via email to the instructor. The project will be due April 29, 2007. More details will be given during the class.
|General Overview of Policies & Security Policy Lifecycle
|Network, Communications, Web, Policies
|Security Policies for Software and Data
|Security Policy: Audit and Compliance
Download Spring 2007 syllabus: inf741syllabus.pdf