ࡱ> HJGa bjbj B=AbAbu lllll8DD)0@@@@@5)7)7)7)7)7)7)$*-[)lUUU[)ll@@p)!!!Ujl@l@5)!U5)!!:&,-'@P@yp& !))0)&R`./`.-'`.l-'Zu@!4l[)[),)UUUU`. B 2:  GROSSMONT COLLEGE Official Course Outline ADMINISTRATION OF JUSTICE (COMPUTER SCIENCE INFORMATION SYSTEMS 260 - INFORMATION SECURITY 1. Course Number Course Title Semester Units Semester Hours AOJ 260 Information Security 3 3 hours lecture: 48-54 hours (CSIS 260) 96-108 outside-of-class hours 144-162 total hours 2. Prerequisites None. Corequisite None. Recommended Preparation None. 3. Catalog Description This course focuses on procedures, policies, and equipment designed to protect private and government proprietary and intellectual information and investigate breaches of security. This course also examines the collection, analysis, and preservation of digital evidence from computer crime scenes. Emphasis is placed upon knowledge of investigative principles, applicable case law, physical and technical security, security management responsibilities, and countermeasures designed to protect and analyze information collection, storage, processing, and transmission. 4. Course Objectives The student will: a. Define information security (infosec). b. Describe information security functions. c. Describe the importance of collecting and preserving digital evidence. d. Identify threats to proprietary information. e. Recognize how computers are used as tools to commit crimes. f. Develop tactical and strategic information protection plans. g. Demonstrate ability to respond to computer crime incidents without damaging electronic evidence. h. Evaluate information security policies and procedures. i. Analyze data to identify vulnerable infosec areas and take corrective action. j. Demonstrate the ability to accurately and thoroughly conduct and document a high-tech investigation. k. Discuss constitutional law related to searching and seizing of digital evidence. l. Evaluate statutory and case law related to computer crimes. m. Demonstrate ability to apply knowledge of computer forensic analysis on disk media. n. Identify, analyze, and develop solutions to problems in security management and computer investigations. o. Demonstrate ability to work collaboratively in a group setting. p. Utilize computer technology and access information via the Internet as appropriate. q. Conduct research appropriate to the discipline. r. Evaluate personal and professional ethical standards. ADMINISTRATION OF JUSTICE (COMPUTER SCIENCE INFORMATION SYSTEMS 260 - INFORMATION SECURITY Page 2 5. Instructional Facilities a. Access the internet. b. Standard classroom with multimedia technology. c. Computer lab for hands-on activities. 6. Special Materials Required of Student Electronic storage media. 7. Course Content a. Introduction to information security (infosec). b. Functions, duties, responsibilities of an infosec manager. c. Threats to information. d. Tactical and strategic information security planning. e. The infosec organization. f. Specific information protection applications. (1) Personal security. (2) Physical security. (3) Computer security. (4) Operations security. g. Future challenges for the information security manager. 8. Method of Instruction a. Lecture, discussion, group projects and audio visual materials as appropriate. b. Qualified guest speakers may be invited to lecture on their respective fields of specialization. c. Field trips to local public safety agencies and security organizations may be arranged. 9. Methods of Evaluating Student Performance Participation. Written assignments. Periodic examinations. Research assignments. Group projects. Oral presentations. Written final examination. 10. Outside Class Assignments a. Reading in required text. b. Critical-thinking and problem solving exercises. c. Research paper. d. Preparation for oral presentations. 11. Texts a. Required Text(s): Britz, M.T. Computer Forensics and Cyber Crime: An Introduction, 2nd edition. Upper Saddle River, NJ: Pearson-Prentice Hall, 2008. b. Supplementary texts and workbooks: None. ADMINISTRATION OF JUSTICE (COMPUTER SCIENCE INFORMATION SYSTEMS 260 - INFORMATION SECURITY Page 3 Addendum: Student Learning Outcomes Upon completion of this course, our students will be able to do the following: Describe information security and the challenges posed by protecting it in a technologically connected world. Demonstrate the importance of collecting and preserving digital evidence, recognizing the challenges posed by the delicate nature of this type of evidence. Summarize the various laws that target criminal behavior with respect to computers and the constitutionality of a search of a high-tech crime scene. Explain characteristics of computer hardware and software that are important to conducting a forensic analysis of a computer system. Recall the various threats to a computer system or computer network and what measures can be taken to mitigate the threats. Date approved by the Governing Board: May 21, 2013   ,.Imnpq    4 5 M N O S ` c ȿѭzoh!hI3OJQJh!h9dOJQJh9dOJQJhOJQJhI3OJQJh%OJQJh/;OJQJh%>*OJQJh9d>*OJQJh+>*OJQJh/;>*OJQJh!h>*OJQJhcQVh>*OJQJhcQVhcQV>*OJQJh!hOJQJ)-. 5 N O {{  `xzd*$gdI3  &zd*$gdI3  &zd*$gdI3  `x$d*$ 'd*$ d*$gdL~ d*$ d*$ O a b i j w y   "  $@pd @pDd*$^`D @pd*$c g h i k v  L o s t ~ < - L z ꯧꏧ|||qfh!h-OJQJh!h}OJQJh!hSOJQJhNo)OJQJh!h^OJQJh!hOJQJ^JhL~OJQJh!h6#OJQJh!h>*OJQJhR.hR.OJQJhR.>*OJQJhR.OJQJhOJQJh!hOJQJh!h.aOJQJ$" M z 6 w i'g,p67 @ppd*$^`pgd! @ppd*$^`pgd> @ppd*$^`pz { |  $ ' - 4 5 6 7 8 w y { ijkm'(ԾԨꝒ߇zzmzbh!hY`OJQJh!h=YoOJQJ^Jh!h!OJQJ^Jh!h!OJQJh!h>OJQJh!h?u}OJQJh!h?rOJQJh!h"OJQJh!h>OJQJh!hDfOJQJh!hI[OJQJh!hOJQJh!hh#OJQJh!hA8OJQJ&()*+34>Kfghik*-.qr6789yźݯwof]hK>*OJQJhr>*OJQJh->OJQJh9{OJQJh!hOOJQJh!hOJQJh!h OJQJ^Jh!h!OJQJ^Jh!h!OJQJh!hBOJQJh!h>OJQJh!h>OJQJ^Jh!hY`OJQJ^Jh!hY`OJQJh!hh#OJQJ!7835^_z{ @pd*$gdr @ppd*$^`pgdr 'd*$gd9d 'd*$gdK @ppd*$^`py{|   12345Կ|qi^SKCChOJQJhe5+OJQJh!haOJQJh!h>OJQJhcQVOJQJhcQVh. OJQJhcQVhbsOJQJhbs5OJQJhbsOJQJhrOJQJh. OJQJh!h>*OJQJh!hOJQJh!hOJQJ^Jh->OJQJh!h->OJQJh!hKOJQJhK>*OJQJh!hK>*OJQJ58]_yOd    !9:@YṮhuzOJQJhzOJQJh!h1wOJQJh1wOJQJhOJQJhL~OJQJhkOJQJhVOJQJhrOJQJh!h>*OJQJh!hOJQJ9XvJKefz{ @pDd*$^`Dgdr @ppd*$^`pgdr @pd*$gdr  ;<Z[y @ppd*$^`pgdr @pd*$gdr & F @pd*$gdrOQRT\%&'1JL?@Agsxm_mRxJhcQVOJQJh*.h7 OJQJ^Jh*.h7 >*OJQJ^Jh7 >*OJQJ^Jh7 OJQJ^Jh!h7 OJQJh!hKOJQJh!hK>*OJQJhK>*OJQJh7 OJQJh!hOJQJhcQVhuzOJQJhuzOJQJhcQVhbsH*OJQJhcQVhbsOJQJhbs5OJQJhuzhuz>*OJQJ&'KL >ssss & F 1$^gd7 h`hgd7  @ppd*$^`pgd7  'd*$gd7  @pd*$gd1 @pd*$gdr p|d*$^`|gdz ?@Atuwxz{|}d @pd*$gd7  @pd*$^`gd7  & F 1$^gd7 stuvxy{|}~ hfCJjhfUhfjhfCJUh!hOJQJh!h7 OJQJ @....()()))()00P8$:pLZBP/ =!"#$%88 Dp!s2 0@P`p2( 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p8XV~ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@_HmH nH sH tH D`D Normal1$OJQJ_HmH sH tH DA D Default Paragraph FontViV  Table Normal :V 44 la (k (No List 8+8  Endnote TextCJ>* > Endnote ReferenceH*::  Footnote TextCJ@& !@ Footnote ReferenceH*NN TOC 1) $ 0*$]^`0JJ TOC 2% $ 0*$]^`0JJ TOC 3% $ p0*$]^p`0JJ TOC 4% $ @ 0*$]^@ `0JJ TOC 5% $ 0*$]^`0BB TOC 6 $0*$^`0:: TOC 70*$^`0BB TOC 8 $0*$^`0BB TOC 9 $ 0*$^`0N N Index 1% $ `*$]^``N N Index 2% $ 0*$]^`0>.@>  TOA Heading *$ $.". CaptionCJ:/: _Equation CaptionPK![Content_Types].xmlN0EH-J@%ǎǢ|ș$زULTB l,3;rØJB+$G]7O٭Vc:E3v@P~Ds |w< (< c z (y5sO " 78@0(  B S  ?ߊߊߊߊߊߊ ^^r ptt=*urn:schemas-microsoft-com:office:smarttags PlaceType=*urn:schemas-microsoft-com:office:smarttags PlaceName9*urn:schemas-microsoft-com:office:smarttagsState8*urn:schemas-microsoft-com:office:smarttagsCity9*urn:schemas-microsoft-com:office:smarttagsplace CJuwxz{|}NO i x @G%u3333333.Inn  45NPck7 7 9   <O\^&&gstuuwxxz{|}~$.<=?@GHQnq  45N9 G H J K R S \ ] d e p q x y | } ~    COQTU\gstuuwxxz{|}QkzP(Q|h 8^8`hH.h ^`hH.h  L^ `LhH.h  ^ `hH.h x^x`hH.h HL^H`LhH.h ^`hH.h ^`hH.h L^`LhH.h ^`hH.h ^`hH.h pLp^p`LhH.h @ @ ^@ `hH.h ^`hH.h L^`LhH.h ^`hH.h ^`hH.h PLP^P`LhH.(QQk                  wv,B<0[. 7 oI[bs x}*o%rY6i"h#($No)+e5+-u&1I3/4/; <>->8B^ CGCD/HK>,P>UcQVLZkZ[[s[.a9dgbl=Yoaq?ru -yF`y@ zuz9{?u};1_ 1}tr39ar2V!!qTY`^:`ySg v+Qe^O!{p%R.Df,Q|f#>z6#(>k1w yoA8L~ $6uw@NNNN@@UnknownG*Cx Times New Roman5Symbol3.*Cx Arial71 CourierA$BCambria Math"9)k1GnzgS  # #!)P4ll| 2Q)PHP ?#2!xx{ " !A Course Outline Template [blank]Grossmont-Cuyamaca Comm CollBarbara Prilaman  Oh+'0 4@ ` l x $A Course Outline Template [blank] ڰAPP-Cuyamaca Comm Coll Normal.dotmBarbara Prilaman4Microsoft Office Word@d@Ys@L`/@@y ՜.+,0  hp  GCCCD# l "A Course Outline Template [blank] Title  !"#$%&'()*+,-./012345689:;<=>@ABCDEFIRoot Entry F0J&@yK1Tablet.WordDocumentB=SummaryInformation(7DocumentSummaryInformation8?CompObjr  F Microsoft Word 97-2003 Document MSWordDocWord.Document.89q