Students in this class will get a sense of the broad range of concepts involved in protecting information assets within computer systems and networks. Beginning with the traditional triad of Confidentiality, Integrity and Availability, the course will also cover ethics, cryptography, system and network security as well as basic strategies for identifying and remediating vulnerabilities within an organization.
- Explain the type and scope of issues associated with cybersecurity and information assurance goals, identify where security is, or can become, vulnerable.
- Using both preventive and reactive strategies, analyze the role of security models and architectures and their relationship to information security, focusing on access control, recovery systems, and incident management.
- Describe the role of access controls, intrusion defense and prevention systems, and organizational policies in securing architecture in information systems.