Course Goal
The goal of this course is to help students gain a comprehensive understanding of the principal components of an information security system. Students will learn to identify and evaluate the different components of an information security system, and apply security measures to data and information systems. They will also be able to understand the importance of information security and the role they play in an organization that uses technology.
Course Aims
By the end of this course, students will be able to:
- Define information security and its importance
- Identify the principal components of an information security system
- Understand different types of attacks and threats to information security
- Recognize different security measures and evaluate their effectiveness
- Analyze how requirements for Information security differ based on an organizational context
Lesson 1: Information Security Fundamentals
Module 1.1: Understanding Information Security
- What is Information Security?
- Why is it important?
- Introducing the principal components of an information security system
Module 1.2: Common Security Terminologies and Concepts
- Different concepts related to information security
- Types of threat agents
- Types of vulnerabilities
- Understanding the CIA Triad
Lesson 2: Attacks and Threats
Module 2.1: Types of Attacks
- Different types of attacks (network-based attacks, application-based attacks, social engineering attacks)
- Techniques and tools used in each type of attack
Module 2.2: Threat Agents
- Types of threat agents (hackers, insiders, nation-states, etc.)
- Characteristics and motivations of different types of threat agents
Lesson 3: Security Measures
Module 3.1: Encryption and Cryptography
- What is encryption?
- Types of encryption techniques
- Cryptography and steganography
Module 3.2: Authentication and Authorization
- Techniques and processes of authentication
- Authorization and access control
Lesson 4: Case Studies
Module 4.1: Real-world Case Studies
- Analyzing some recent security breaches
- Understanding the attacks and their effects
Module 4.2: Evaluation of the effectiveness of Security Measures
- Analyzing popular security measures
- Evaluating the effectiveness of different security measures
Lesson 5: Organizational Security
Module 5.1: Types of Organizational Contexts
- Different types of organizational contexts
- Security requirements for different contexts
Module 5.2: Developing and Implementing Security Policies
- What are Security policies?
- Developing and implementing security policies
This is a 5-lesson course plan for Computer Science students studying at the college level. It covers the principal components of an information security system and provides a comprehensive understanding of information security. Students will be able to identify and evaluate different components of the security system, learn about different types of attacks and threats, recognize different security measures, and analyze how the requirements for information security differ based on an organizational context. By the end of this course, students will have gained a strong grounding in information security and be well-equipped to contribute to an organization's security plan.