Preview

Syllabus MIS 6330

Good Essays
Open Document
Open Document
3060 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Syllabus MIS 6330
Course Syllabus
MIS 6330
School of Management
The University of Texas at Dallas

| Course Info | Tech Requirements | Access & Navigation | Communications | Resources | Assessments | Academic Calendar | Scholastic Honesty | Course Evaluation | UTD Policies |

Course Information

Course

Course Number Section MIS 6330.0I1
Course Title Information Technology Security
Term and Dates Spring 2013

Professor Contact Information
Professor Huseyin Cavusoglu
Office Phone (972) 883-5939
Email Address eLearning Email
Office Location JSOM 3.418
Online Office Hours N/A Other Information The quickest and easiest way to contact me is through email. If it is a topic that needs to be addressed over the phone, you can email me to set up a time to call/meet.

About the Instructor
Dr. Cavusoglu is an associate professor of information systems in the Jindal School of Management at UTD. Prior to joining to UTD, he was an assistant professor in the A.B. Freeman School of Business at Tulane University. He received his PhD in management science with specialization in information systems in 2003. His teaching specialty is information technology security, and he has been teaching this course since 2003. His main research interests include information security management and the economics of information systems. He has published articles on the economic aspects of information security in various academic journals.

Course Pre-requisite MIS 6304 or MIS 6350

Course Description
The need for organizations to protect critical information assets continues to increase. Today, more than ever, organizations require professionals who understand technical issues and who are also capable of devising security strategies. Contrary to the common view, information security is mainly a managerial problem. Only through effective management of security, can security polices be defined and technical solutions be selected. The

You May Also Find These Documents Helpful

  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Imagine that you are working for a startup technology organization that has had overnight success. The organization’s immediate growth requires for it to formulate a corporate strategy for information security. You have been recruited to serve as part of a team that will develop this strategy.…

    • 514 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment 1

    • 1434 Words
    • 6 Pages

    Information has become the most valuable asset of any organization. And keeping that information secure is a major factor in the design and development of any computer system. Security is defined by Merriam-Webster as “the state of being protected or safe from harm”. It is up to every organization to insure that their data is protected, and that nothing that is harmful to the company or its clients is compromised.…

    • 1434 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Is4231 Week 5

    • 3436 Words
    • 14 Pages

    Evaluate the internal and external factors that influence the activities and organization of an information security program List and describe the typical job titles and functions performed…

    • 3436 Words
    • 14 Pages
    Powerful Essays
  • Powerful Essays

    Kudler Security Report

    • 8349 Words
    • 34 Pages

    References: Whitman, M., & Mattord, H. (2010). Management of Information Security (3rd ed.). Retrieved from https://ecampus.phoenix.edu/content/eBookLibrary2/content/eReader.aspx?…

    • 8349 Words
    • 34 Pages
    Powerful Essays
  • Satisfactory Essays

    Syllabus Qrb-501

    • 1165 Words
    • 5 Pages

    Course Description This course applies quantitative reasoning skills to business problems. Students learn to analyze data using a variety of analytical tools and techniques. Other topics include formulas, visual representation of quantities, time value of money, and measures of uncertainty. Policies Faculty and students/learners will be held responsible for understanding and adhering to all policies contained within the following two documents: • • University policies: You must be logged into the student website to view this document. Instructor policies: This document is posted in the Course Materials forum.…

    • 1165 Words
    • 5 Pages
    Satisfactory Essays
  • Powerful Essays

    Syllabus Spring 2015 102

    • 1622 Words
    • 12 Pages

    university. Short papers and at least two major essays in a variety of academic genres are…

    • 1622 Words
    • 12 Pages
    Powerful Essays
  • Best Essays

    This course is an introductory course, surveying major issues in international politics. The first section…

    • 2016 Words
    • 12 Pages
    Best Essays
  • Satisfactory Essays

    Security Breach at Tjx

    • 288 Words
    • 2 Pages

    Assignment 3 requires you to critically review the assigned case study and write a report…

    • 288 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    107 Syllabus S15

    • 773 Words
    • 4 Pages

    Reading 1: Business and Politics in the U.S., Graham Wilson, “Business & Politics, A Comparative Introduction,” 2003…

    • 773 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    For businesses to keep pace with the latest technology, threats and to remain in compliance with current and future regulations or policies need to have effective management of information security in their organization. Information Security Management Frameworks are based on existing accepted standards, guidelines, and collections of practices that should be implemented in an IT department. I will discuss some frameworks of information security management, their pros and cons, some major perspectives to consider in information security management and the benefits of information security management frameworks.…

    • 721 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    James M. Stewart, M. C. CISSP- Certified Information Systems Security Profession Study Guide (Vol. 6th ed).…

    • 1033 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Cyber Warfare/Motivations

    • 1841 Words
    • 8 Pages

    Layton, Timothy P. (2007). Information Security: Design, Implementation, Measurement, and Compliance. Boca Raton, FL: Auerbach publications.…

    • 1841 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    Management’s Role in Information Security V.T. Raja, Ph.D., Oregon State University Outline • Example: iPremier Company (HBR article) – Background about company – Business Implications – Some recommendations for future • Management’s role in information security • Framework for a balanced approach to security Example: DDoS attack on iPremier Company • For a background about the company - refer to MS Word Document distributed in class. • Problems at Colocation facility: •…

    • 1251 Words
    • 10 Pages
    Good Essays
  • Better Essays

    In today’s time, every organization is made up of information security systems. Information security systems are what keep an organization running smoothly and efficiently while holding all their important information in their computers and networks. All information security systems consist of password protections, firewalls; many different security features can prevent hackers from attacking, physical protection of the network and computer systems as well as confidentiality requirements.…

    • 1131 Words
    • 5 Pages
    Better Essays