MGT5114 – Introduction to Information Security Management
Credit Hours: 3
Examines the fundamental principles of computer security as applied to information technology (IT). Covers foundations, psychology, prevention, detection, human factors, technical considerations, management processes and future considerations for the security of information technology.
Grades
Assignments
- FIT – MGT5114 – Week8 – Discussion 10 (4/27/2017) - Discuss how having your personal information in online databases may lead to identity theft. How can you protect yourself from…
- FIT – MGT5114 – Week8 – Discussion 9 (4/27/2017) - Law and ethics are often both considerations when determining the reaction to a computer security incident. For instance, scanning for…
- FIT MGT5114 – Wk7 Discussion 1 Post (4/26/2017) - Security and risk are clearly related; the more at-risk a system or data set is the more security is desirable…
- FIT MGT5114 – Wk6 Discussion 1 Post (4/25/2017) - Discuss three possible inclusions in a security policy. How do they differ from those included in a business continuity plan?…
- FIT MGT5114 – Wk5 Discussion 1 Post (4/5/2017) - Question: Telecommunication network providers and users are concerned about the single point of failure in the “last mile”, which is…
- FIT MGT5114 – Wk4 Discussion 1 Peer Response (4/2/2017) - Good post and you are certainly in the majority with your perspective regarding the existence of duplicate records in a…
- FIT MGT5114 – Wk4 Discussion 1 Post (3/28/2017) - Question: Can a database contain two identical records without a negative effect on the integrity of the database? Why or…
- FIT MGT5114 – Wk3 Discussion 1 Peer Response (3/26/2017) - I enjoyed reading your post, and I appreciate your comments on my post. Sometimes it's easy to forget the tools I…
- FIT MGT5114 – Wk3 Discussion 1 Post (3/22/2017) - Question: The traditional protection levels used by operating systems to protect files are read, write, and execute. What are some…
- FIT MGT5114 – Wk2 Discussion 1 Peer Response (3/19/2017) - Response 1: Good points. To play devil's advocate here do you think that the scenario you put forward regarding OS or…
- FIT MGT5114 – Wk2 Discussion 1 Post (3/15/2017) - Question: Is unexpected behavior in a computer program necessarily a vulnerability? Why or why not? Response: According to Pfleeger, Pfleeger…
- FIT MGT5114 – Wk1 Discussion 2 Peer Response (3/12/2017) - I enjoyed reading your post. Many hobbyist black hat hackers and script kiddies are pretty lazy. I understand the concept…
- FIT MGT5114 – Wk1 Discussion 1 Peer Response (3/12/2017) - I enjoyed reading your post. Long, complex passwords have become an essential security measure. I am an aspiring ethical hacker,…
- FIT MGT5114 – Wk1 Discussion 2 Post (3/8/2017) - Question: Why should you periodically change the key used to encrypt messages? What attack is more likely to succeed if…
- FIT MGT5114 – Wk1 Discussion 1 Post (3/8/2017) - Question: Do you currently use, or have you used in the past, any computer security measures? If so, what do…