MET CS 684 Security Policies and Procedures
PLEASE NOTE: THIS IS THE SYLLABUS TO A PREVIOUS FACE-TO-FACE OFFERING OF THIS COURSE
IT IS NOT UP-TO-DATE
IN PARTICULAR, THE TEXTBOOKS ARE NOT NECESSARILY THE ONES CURRENTLY IN USE
THIS OLD SYLLABUS IS LEFT ONLINE TO PROVIDE A SENSE OF HOW THE COURSE WAS DESIGNED IN THE PAST
SOME ASPECTS REMAIN INTACT
FOR INFORMATION, CALL THE DEPARTMENT FOR INFORMATION
(617)353-2566
Background of the Instructor changed if this is red | Learning Objectives changed if this is red |
Contacting Eric Braude changed if this is red | Plagiarism Warning changed if this is red |
Evaluation of Students changed if this is red | Policies – Miscellaneous changed if this is red |
Forums: Past and Present changed if this is red | Textbooks and Materials changed if this is red |
Home Page of Eric Braude changed if this is red | Topics, Class Dates & Readings changed if this is red |
Homework and Due Dates changed if this is red |
Description:
This course enables IT professional leaders to identify emerging security risks and implement security policies to support organizational goals. Discussion of methodologies for identifying, quantifying, mitigating and controlling risks. Students implement IT risk management plans that identify alternate sites for processing mission-critical applications, and techniques to recover infrastructure, systems, networks, data and user access. The course also discusses topics such as disaster recovery, handling information security; protection of property, personnel and facilities; protection of sensitive and classified information, privacy issues, and criminal terrorist and hostile activities.
Learning Goals
- Understand the common Information Systems Security models
- Review CIA characteristics – confidentiality, integrity and availability
- Understand security measures from Technology, Policy & Practice and Education/Training/Awareness dimensions.
- Understand risk management – identification, quantification, response and control.
- Learn disaster recovery procedures and countermeasures for the business enterprise.
Textbook and Materials
Information Security Policies and Procedures: A Practitioner’s Reference by Thomas R. Peltier, Second edition, Auerbach, ISBN 0-8493-1958-7
Guide to Disaster Recovery Erbschloe, M. (2003) Thomson Course Technology ISBN 9 780619 131227
Security Policies and Procedures: Principles and Practices Sari Greene (2005) Prentice Hall ISBN 0-13-186691-5
Evaluation of Students
Absorbing and creating security system policies will be expected of all students. To attain excellence, students will be expected to create original analyses and comparisons. The course grade will be computed from the following
Weekly assignments: 35%
Weekly quizzes: 15%
Class participation: 20%
Final: 30%
Class Participation
Students are required to participate in class or online discussions because this is an effective and, for many, an enjoyable way to learn. Participation is evaluated as follows.
Make a note of the substantive comments that you make in class or sent to the class via the class site. I often ask question of the class to encourage participation. You are encouraged to participate in class at all times in any case. At any time prior to one week before the final, submit these. Each should consist of the date, the context of the discussion at the time, and a short paragraph of what you said, a half page at the most. Here are some context examples.
- We were discussing how to obtain buy-in from developers for security policies:
- Responding to a comment raised by another student concerning the use of UML inheritance:
- Responding to a question put to the class by the professor:
- Responding to a question by a student:
You are reminded that plagiarism is taken very seriously by the Boston University community; so don’t create imaginary comments, including material from the Internet. The criteria for participation are as follows:
a. Proportion of substantive contributions. This is the percentage of documented contributions that have significant content. 75% would be a good fraction. 95% is definitely excellent
b. Number of substantive contributions. This counts the number of substantive contributions. In a class of 15, two per class would be good. Larger classes result necessarily in proportionately lower contribution per person.
g. Evenness of contributions. This measures the uniformity of your contributions throughout the semester. A contribution every week would be good in this respect.
Late homework will not be accepted unless there is a reason why it was impossible to perform the work in time given work and emergency conditions. In that case, e-mail the written reason should be attached to the homework, which will be graded on a pass/fail basis if the reason is accepted by me.
Warning concerning plagiarism
Please cite all references and uses of the work of other. All instances of plagiarism must be reported to the College for action. e-mail, see or call me if you have any doubts about the proper use of others’ material. In any case, clearly acknowledge all sources in the context they are used, including code, of course.
Syllabus
1. Introduction and Threats to Enterprise Security
1A: Introduction and Threats
- Vulnerabilities
- The U.S. National Level
- Introduction to Risk Thinking
1B: An Overview of Security Responses
Readings: Peltier 287-306; 259-263
Greene Most Helpful: 65 – 72; Additional: 72 – 81
2. I.T. Enterprise Security Issues
2A: Common Enterprise Security Issues
- Ethical Issues
- Legal and Regulatory Issues (Sarbanes-Oxley, HIPAA, FDA, etc.)
- Asset Security
- Security Risk
2B: Specialized Security Issues
- Security in a connected world (India, Ireland, ….)
- Runtime security
- Other security issues
Readings: Peltier 367-370
Greene Most Helpful: 387 – 396, 425 – 443
Additional: 397-423 page through: 117-137; 425-455; 463-481
See references to risks via index as needed
3. Security Policies, Standards and Procedures
3A: Security Policies
- Rationale for Policies, Standards and Procedures
- Preparing and Gathering Information
- Policy Parameters
- Policy Tiers
- Enterprise-Tier Policies
- Topic-Tier Policies
- Application-Tier Policies
- Asset Classification
3B: Security Standards and Procedures
Readings: Peltier 47-80, 113-162 and 199-241
Greene Most Helpful: 1-25, 35 – 51, 91-106, 185 – 203
4. I.T. Operational Security Management
4A: Common Operational Security Management
- Quality Assurance in Software Development
- Security in system development
4B: Specialized Issues in Operational Security Management
- The Need to Communicate Security Policies
- Program Planning Principles
- Scope and Approvals
- Assessment of Security State and Needs
- Program Aspects
- Implementation
- Maintenance
Readings: Peltier 325-358
Greene Most Helpful: 311 – 325; Additional: 325-337
5. I. T. Business Continuity: Preparation
5A: An introduction to business continuity and disaster recovery
- Reviewing business continuity concepts
- Establishing principles of disaster recovery planning
- Reviewing steps for disaster recovery planning
- Preparing to develop a disaster recovery plan
5B: Preparing for I.T. continuity
- Assessing risks
- Prioritizing assets for recovery
- Developing plans and procedures
- Learning organizational relationships
Readings: Erbschloe Chapters 1-6
Greene Most Helpful: 351 – 365
6. Implementation of Disaster Recovery and Continuing Operations
6A: Recovering from disasters
- Responding to attacks
- Implementing recovery plans
Reading: Erbschole Chapter 12 (page 317-343)
6B: Ongoing Quality
- Learning from disasters
- Measuring quality
- Managing ongoing quality processes
Review for Final
Readings: Erbschloe Chapter 12 (317-343); Chapter 3 is background reading for the first part of lecture 6B
Greene Most Helpful: 365 – 375