Apply to USF Now | Graduate Admissions | Events & Workshops | Giving to the Office of Graduate Studies

Graduate Course Proposal Form Submission Detail - CIS6377

Edit function not enabled for this course.


Current Status: Approved by SCNS - 2014-04-30
Campus: Tampa
Submission Type: New
Course Change Information (for course changes only):
Comments: elective for MSIT; to GC; Apprd 12/10/13. To USF Sys 2/4/14, to SCNS 2/12/14. Approved eff 4/1/14. Subm as CAP 6033; Approved as CIS 6377


  1. Department and Contact Information

    Tracking Number Date & Time Submitted
    2939 2012-09-11
     
    Department College Budget Account Number
    Deans Office EN
     
    Contact Person Phone Email
    Dave Armitage 8636677091 armitage@usf.edu

  2. Course Information

    Prefix Number Full Title
    CIS 6377 Information Security Architecture for IT

    Is the course title variable? N
    Is a permit required for registration? N
    Are the credit hours variable? N
    Is this course repeatable?
    If repeatable, how many times? 0

    Credit Hours Section Type Grading Option
    3 C - Class Lecture (Primarily) -
     
    Abbreviated Title (30 characters maximum)
    Info Security Architecture
     
    Course Online? Percentage Online
    B - Face-to-face and online (separate sections) 0

    Prerequisites

    None

    Corequisites

    None

    Course Description

    The course outlines a complete roadmap to a successful adaptation and implementation of a security program based on a code of practice for information security management.


  3. Justification

    A. Please briefly explain why it is necessary and/or desirable to add this course.

    Needed for new program/concentration/certificate

    B. What is the need or demand for this course? (Indicate if this course is part of a required sequence in the major.) What other programs would this course service?

    Increased education access, education attainment and economic development are key priorities for the Florida region served by USF. The U. S. Labor Department, Florida Works, and regional development councils have identified key occupational growth areas anticipated in education; management and administration; nursing and health sciences; criminal justice; industrial, manufacturing, warehousing and distribution engineering; information technology and industrial applications of technology.

    C. Has this course been offered as Selected Topics/Experimental Topics course? If yes, how many times?

    No

    D. What qualifications for training and/or experience are necessary to teach this course? (List minimum qualifications for the instructor.)

    PhD


  4. Other Course Information

    A. Objectives

    Students will learn:

    - To scrutinize information security risks from all stakeholders perspectives

    - A programmatic approach applying to businesses of all sizes

    - A process which can customize information security practices for their own requirements

    - Learn how to conduct a risk assessment covering all controls and control objectives

    - How to use data qualitatively and quantitatively to meet standards

    B. Learning Outcomes

    Students shall be able to:  Recognize information security risks Perform a risk assessment for a small business Make recommendations to address deficiencies found in an assessment. Customize information security practices to specific environments Use security data qualitatively and quantitatively, as appropriate

    C. Major Topics

    Introduction Data Mining Concepts. Data Processing. An Overview: Data Warehouse and OLAP Technology. Data Cube Computation and Data Generalization. Mining Frequent Patterns, Associations and correlations. Classification and Prediction. Cluster Analysis. Mining Stream, Time-series, and Sequence Data. Graph Mining, Social Network Analysis, and Multirelational Data Mining. Applications and Trends in Data Mining.

    D. Textbooks

    E. Course Readings, Online Resources, and Other Purchases

    http://csrc.nist.gov/

    www.informationsecurity.techtarget.com

    www.cert.org/

    www.sans.org/rr

    www.ftc.gov/infosecurity

    www.issa.org

    Supplementary Readings:

    - Information Security Architecture by Jan Killmeyer

    - Enterprise Security Architecture: A Business-Driven Approach by John Sherwood, Andrew Clark, David Lynas

    - Information Security: A Strategic Approach by Vincent LeVeque

    F. Student Expectations/Requirements and Grading Policy

    Student performance will be evaluated based on class attendance and participation, two exams, exercises and assignments. Each unexcused absence will result in an automatic deduction of 2 percentage points from the Class Attendance grade. The relative weights for each of these components in determining the final grade are as follows:

    Class Attendance and Participation 10%

    3 Exams 40%

    Exercises and Assignments 50%

    Total 100%

    A grade will be determined based on the total of possible points earned, as follows: A 90-100; B 80-89; C 70-79; D 60-69; F 0-59.

    G. Assignments, Exams and Tests

    See V. above

    H. Attendance Policy

    Course Attendance at First Class Meeting – Policy for Graduate Students: For structured courses, 6000 and above, the College/Campus Dean will set the first-day class attendance requirement. Check with the College for specific information. This policy is not applicable to courses in the following categories: Educational Outreach, Open University (TV), FEEDS Program, Community Experiential Learning (CEL), Cooperative Education Training, and courses that do not have regularly scheduled meeting days/times (such as, directed reading/research or study, individual research, thesis, dissertation, internship, practica, etc.). Students are responsible for dropping undesired courses in these categories by the 5th day of classes to avoid fee liability and academic penalty. (See USF Regulation – Registration - 4.0101,

    http://usfweb2.usf.edu/usfgc/ogc%20web/currentreg.htm)

    Attendance Policy for the Observance of Religious Days by Students: In accordance with Sections 1006.53 and 1001.74(10)(g) Florida Statutes and Board of Governors Regulation 6C-6.0115, the University of South Florida (University/USF) has established the following policy regarding religious observances: (http://usfweb2.usf.edu/usfgc/gc_pp/acadaf/gc10-045.htm)

    In the event of an emergency, it may be necessary for USF to suspend normal operations. During this time, USF may opt to continue delivery of instruction through methods that include but are not limited to: Blackboard, Elluminate, Skype, and email messaging and/or an alternate schedule. It’s the responsibility of the student to monitor Blackboard site for each class for course specific communication, and the main USF, College, and department websites, emails, and MoBull messages for important general information.

    Class attendance is not optional. The course moves through the material at a rapid pace, and each topic builds on the ones that preceded it. Catching up is difficult, and attempting to “cram”

    the material will surely lead to failure to adequately grasp it. Therefore, students are responsible for their class attendance, and are advised that repeated absences will affect their grades.

    I. Policy on Make-up Work

    Make-up policy will be implemented only under extenuating circumstances, and will be discussed on a case-by-case basis.

    J. Program This Course Supports

    Master of Science in Information Technology


  5. Course Concurrence Information

    None



- if you have questions about any of these fields, please contact chinescobb@grad.usf.edu or joe@grad.usf.edu.