Essay about Test
This course identifies and defines the types of risks that information systems professionals need to consider during the development and implementation of computer based information systems. This course will survey remedies and prevention techniques available to address the risk areas present. Organizational policies and current regulatory considerations will also be examined relative to development, implementation, and use of computer based information systems. Policies
Faculty and students/learners will be held responsible for understanding and adhering to all policies …show more content…
Keston, G. (2008). Identity management for IT security and administration. Faulkner Information Services.
Vosevich, K. (2011). Risk management software market trends. Faulkner Information Services.
Barr, J. (2009). Federal business continuity plans. Faulkner Information Services.
Ledford, J. L. (2011). Federal Information Security Management Act (FISMA). Faulkner Information Services.
Ainsworth, M. (2009). The business continuity planning process. Faulkner Information Services.
Barr, J. G. (2007). The standard of good practice for information security. Faulkner Information Services.
Drumheller, R. (2011). Conducting an information security gap analysis. Faulkner Information Services.
All electronic materials are available on the student website.
Point Values for Course Assignments ASSIGNMENTS | Points | Individual (60%) | | SR-HT-001 Paper (Week 2) | 15 | Security Monitoring Paper (Week 3) | 15 | Outsourcing Risks Paper (Week 4) | 20 | Participation (2 points per week) | 10 | Learning Team (40%) | | Project Paper (Week 5) | 20 | Presentation (Week 5) | 10 | Weekly DQ (2 points per week) | 10 | Total | 100 |
Week One: Enterprise Information Systems