Graduate Studies Reports Access

Graduate Course Proposal Form Submission Detail - CIS6377
Tracking Number - 2939

Edit function not enabled for this course.


Current Status: Approved by SCNS - 2014-04-30
Campus: Tampa
Submission Type: New
Course Change Information (for course changes only):
Comments: elective for MSIT; to GC; Apprd 12/10/13. To USF Sys 2/4/14, to SCNS 2/12/14. Approved eff 4/1/14. Subm as CAP 6033; Approved as CIS 6377


Detail Information

  1. Date & Time Submitted: 2012-09-11
  2. Department: Deans Office
  3. College: EN
  4. Budget Account Number:
  5. Contact Person: Dave Armitage
  6. Phone: 8636677091
  7. Email: armitage@usf.edu
  8. Prefix: CIS
  9. Number: 6377
  10. Full Title: Information Security Architecture for IT
  11. Credit Hours: 3
  12. Section Type: C - Class Lecture (Primarily)
  13. Is the course title variable?: N
  14. Is a permit required for registration?: N
  15. Are the credit hours variable?: N
  16. Is this course repeatable?:
  17. If repeatable, how many times?: 0
  18. Abbreviated Title (30 characters maximum): Info Security Architecture
  19. Course Online?: B - Face-to-face and online (separate sections)
  20. Percentage Online: 0
  21. Grading Option: -
  22. Prerequisites: None
  23. Corequisites: None
  24. Course Description: The course outlines a complete roadmap to a successful adaptation and implementation of a security program based on a code of practice for information security management.

  25. Please briefly explain why it is necessary and/or desirable to add this course: Needed for new program/concentration/certificate
  26. What is the need or demand for this course? (Indicate if this course is part of a required sequence in the major.) What other programs would this course service? Increased education access, education attainment and economic development are key priorities for the Florida region served by USF. The U. S. Labor Department, Florida Works, and regional development councils have identified key occupational growth areas anticipated in education; management and administration; nursing and health sciences; criminal justice; industrial, manufacturing, warehousing and distribution engineering; information technology and industrial applications of technology.
  27. Has this course been offered as Selected Topics/Experimental Topics course? If yes, how many times? No
  28. What qualifications for training and/or experience are necessary to teach this course? (List minimum qualifications for the instructor.) PhD
  29. Objectives: Students will learn:

    - To scrutinize information security risks from all stakeholders perspectives

    - A programmatic approach applying to businesses of all sizes

    - A process which can customize information security practices for their own requirements

    - Learn how to conduct a risk assessment covering all controls and control objectives

    - How to use data qualitatively and quantitatively to meet standards

  30. Learning Outcomes: Students shall be able to:  Recognize information security risks Perform a risk assessment for a small business Make recommendations to address deficiencies found in an assessment. Customize information security practices to specific environments Use security data qualitatively and quantitatively, as appropriate
  31. Major Topics: Introduction Data Mining Concepts. Data Processing. An Overview: Data Warehouse and OLAP Technology. Data Cube Computation and Data Generalization. Mining Frequent Patterns, Associations and correlations. Classification and Prediction. Cluster Analysis. Mining Stream, Time-series, and Sequence Data. Graph Mining, Social Network Analysis, and Multirelational Data Mining. Applications and Trends in Data Mining.
  32. Textbooks:
  33. Course Readings, Online Resources, and Other Purchases: http://csrc.nist.gov/

    www.informationsecurity.techtarget.com

    www.cert.org/

    www.sans.org/rr

    www.ftc.gov/infosecurity

    www.issa.org

    Supplementary Readings:

    - Information Security Architecture by Jan Killmeyer

    - Enterprise Security Architecture: A Business-Driven Approach by John Sherwood, Andrew Clark, David Lynas

    - Information Security: A Strategic Approach by Vincent LeVeque

  34. Student Expectations/Requirements and Grading Policy: Student performance will be evaluated based on class attendance and participation, two exams, exercises and assignments. Each unexcused absence will result in an automatic deduction of 2 percentage points from the Class Attendance grade. The relative weights for each of these components in determining the final grade are as follows:

    Class Attendance and Participation 10%

    3 Exams 40%

    Exercises and Assignments 50%

    Total 100%

    A grade will be determined based on the total of possible points earned, as follows: A 90-100; B 80-89; C 70-79; D 60-69; F 0-59.

  35. Assignments, Exams and Tests: See V. above
  36. Attendance Policy: Course Attendance at First Class Meeting – Policy for Graduate Students: For structured courses, 6000 and above, the College/Campus Dean will set the first-day class attendance requirement. Check with the College for specific information. This policy is not applicable to courses in the following categories: Educational Outreach, Open University (TV), FEEDS Program, Community Experiential Learning (CEL), Cooperative Education Training, and courses that do not have regularly scheduled meeting days/times (such as, directed reading/research or study, individual research, thesis, dissertation, internship, practica, etc.). Students are responsible for dropping undesired courses in these categories by the 5th day of classes to avoid fee liability and academic penalty. (See USF Regulation – Registration - 4.0101,

    http://usfweb2.usf.edu/usfgc/ogc%20web/currentreg.htm)

    Attendance Policy for the Observance of Religious Days by Students: In accordance with Sections 1006.53 and 1001.74(10)(g) Florida Statutes and Board of Governors Regulation 6C-6.0115, the University of South Florida (University/USF) has established the following policy regarding religious observances: (http://usfweb2.usf.edu/usfgc/gc_pp/acadaf/gc10-045.htm)

    In the event of an emergency, it may be necessary for USF to suspend normal operations. During this time, USF may opt to continue delivery of instruction through methods that include but are not limited to: Blackboard, Elluminate, Skype, and email messaging and/or an alternate schedule. It’s the responsibility of the student to monitor Blackboard site for each class for course specific communication, and the main USF, College, and department websites, emails, and MoBull messages for important general information.

    Class attendance is not optional. The course moves through the material at a rapid pace, and each topic builds on the ones that preceded it. Catching up is difficult, and attempting to “cram”

    the material will surely lead to failure to adequately grasp it. Therefore, students are responsible for their class attendance, and are advised that repeated absences will affect their grades.

  37. Policy on Make-up Work: Make-up policy will be implemented only under extenuating circumstances, and will be discussed on a case-by-case basis.
  38. Program This Course Supports: Master of Science in Information Technology
  39. Course Concurrence Information: None


- if you have questions about any of these fields, please contact chinescobb@grad.usf.edu or joe@grad.usf.edu.