Presentation is loading. Please wait.

Presentation is loading. Please wait.

Course Objectives A strong grounding in computer and network security. Learn the factors related to the plan-protect-respond cycle of IT security. An.

Similar presentations


Presentation on theme: "Course Objectives A strong grounding in computer and network security. Learn the factors related to the plan-protect-respond cycle of IT security. An."— Presentation transcript:

1

2 Course Objectives A strong grounding in computer and network security. Learn the factors related to the plan-protect-respond cycle of IT security. An understanding of networking concepts. You will learn of the importance of IT security to the accounting profession and of the various control frameworks that accountant's rely on for compliance. This course is learning about defense so we will learn about many threats and how they exploit vulnerabilities but we will NOT be using these exploits in class. 2

3 Syllabus Highlights Dr. Steven Hornik email: shornik@ucf.edushornik@ucf.edu Course Webpage: http://acg6415.wikispaces.com/http://acg6415.wikispaces.com/ Office Hours: Monday - Thursday 2:30 – 4:00 ; and by appointment Office: BA1 432

4 Text Book Corporate Computer and Network Security, 3 rd Edition by Randall J. Boyle and Raymond R. Panko

5 Grade Components Exam 1 (Ch. 1 – 4, module A & Readings)250 Exam 2 (Ch. 5- 10 & Readings)250 Access Control Simulation100 Security in the News 100 Participation 50 Total Points 750

6 Grading Scale A 4.00 100-93 A- 3.75 92-90 B+ 3.25 89-86 B 3.00 85-83 B- 2.75 82-80 C+ 2.25 79-76 C 2.00 75-73 C- 1.75 72-70 D+ 1.25 69-66 D 1.00 65-63 D- 0.75 62-60 F 0.00 <59

7 Exams Two Part Exams 1 st Part Multiple choice Matching Time Limit ~ 60 minutes 2 nd Part Short-answer / Essay (with Notes/Book) Time Limit 2.5 hours Exams can be taken in any order

8 Wiki Pages to Update Security in the News FlipBoard You will be contributing to a digital book/magazine You will contribute an article related to IT Security More on flipboard later….

9 Security In The News Locate an article/video, etc. related to a security breach 1.Add an article to our class FlipBoard 2.Provide a summary of what happened 3.Detail the breach that occurred 4.Provide a description of what control could have prevented/detected the breach 5.Quality counts 6.No duplicate articles allowed 9

10 Access Control Simulation 10

11 Access Control Simulation - Tutorial 11

12 Access Control Simulation 12

13 Access Control - Office 13

14 Access Control Report You have been hired to conduct an IT control review Examine the office locations Each office Each Cubicle Each room Note controls in place Note missing controls Prepare report summarizing your findings Include a table that shows: Place Visited Control found Control Missing Recommended Fix (if necessary) 14


Download ppt "Course Objectives A strong grounding in computer and network security. Learn the factors related to the plan-protect-respond cycle of IT security. An."

Similar presentations


Ads by Google