Skip to content

This repo contains a digitized version of the course content for CYBR3600 (Information Security Policy) at the University of Nebraska at Omaha.

License

Notifications You must be signed in to change notification settings

MLHale/CYBR3600

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Table of contents

Online discussion area
Location
Class topics
Syllabus
License

Viewing these materials

The class materials are best viewed at https://mlhale.github.io/CYBR3600/

Online Discussion Area

I have setup an online discussion board on slack.com for usage in this class. If you decide to work on a group project, I can create some private channels for you to work on, but I want to be able to participate in your conversations - so please use the space on slack.

Go to drhale3600.slack.com and use your unomaha email address to register an account. Alternatively, you can use this link.This will give you access to the class slack channel. The chat channel is for general discussions with me or your fellow classmates. The questions channel is for you to ask public questions that I will answer for the whole class. This is better than email if you think that the answer to your question might benefit everyone. You can also send me private messages. Generally I am faster at replying on slack than I am by email.

Location

All classroom activities will take place in PKI room 252 unless otherwise noted ahead of time.

Texts

Tentative Class Topics and course overview

Syllabus

Date/Time: Tuesday/Thursday 1:30pm – 2:45pm Instructor: Dr. Hale Office: PKI 174-D, (402) 554-3978 Office Hours: Open door policy, or by appointment E-mail: mlhale@unomaha.edu

Course Abstract

Policy is an integral element of Information Security within and across organizations. This course will cover the development of security policies and procedures at an organizational level, how such policies are intertwined with regulatory compliance necessities, and the legal, ethical, and financial implications of policy. Students will leave with the ability to go into an organization and understand the basis for and effect of IT policies. Students will also be able to apply policies to information systems and cover human factors such as constructing a security awareness campaigns to satisfy operational security controls and prevent attacks such as phishing and spear phishing.

Grading Breakdown (due dates are tentative)

  • (10%) Class participation
  • (40%) Homework & Projects
  • (20%) Quizzes
  • (30%) Final Exam

Each project will have a specific grading rubric that includes the core requirements for the project (i.e. what the application must do), any required intermediate milestone goals (such as short progress meetings with the instructor), the project due date, and the list of items that must be submitted. At least one of the projects will include a presentation component to be presented in class on the project due date.

Attendance

  • Class Attendance: Attendance is highly recommended, there are a number of in-class participation measures, so if you miss class your grade may suffer.
  • Presentation Attendance (Mandatory): If you miss class on a presentation day (Dates TBA) you will receive a 0 on the presentation portion of the project grade unless you have a university-approved excuse or an approved extension (see below).

Group Work

Students may choose (or be compelled) to work in groups on certain assignments. Group work may optionally (at the discretion of the instructor) include an individual participation grade worth 40% of the total group points, e.g. a group may make a 100% on a particular project, but an individual with low participation in the group may make a 60%.

Team formation

The instructor reserves the right to make a change to any team or any project during the course of the semester for any reason that may or may not be disclosed. Project rescoping will be performed in this event.

Service Learning / Real World Customers

As part of UNO’s strategic initiatives, individuals or groups may be partnered with community organizations in Omaha for service learning. If community partners can be identified, student projects (group or individual) in the class may be directed at meeting community needs. In the event of community projects, appropriate scoping will be considered to ensure that community needs can be met within the time constraints of the coursework.

Project Extensions and Late work

Sometimes unforeseen events occur or work takes longer than expected. In such cases, an extension may be requested. To receive an extension, individuals or groups must request an extension at least 24hours in advance of the due date. Extension time frames are at the discretion of the instructor, but generally will not be longer than 1 week. Failure to request an extension 24 hours prior to the due date means that the work is due at the specified time. Granting extensions is at the discretion of the insturctor. Late work without a requested extension will receive a 5% point reduction per day up to a total of 40%. Late work submitted 8 days after an original (or extended) due date will not be accepted.

Special accommodations for students with disabilities

Students with disabilities requiring special accommodations must contact disability services. Disability services may be reached by phone at (402) 554-2872 or by email at unodisability@unomaha.edu.

Special accommodations for active duty or reserve military

Students serving in the military requiring special accommodations (e.g. unit deployment) must contact the office of Military and Veteran Services by phone at (402) 554-2349 or by email at unovets@unomaha.edu.

Respect and Commitment to Diversity and Inclusion

Students from all backgrounds and perspectives are respected in this course. Diverse viewpoints will be viewed as a resource, strength, and benefit to the course rather than a non-conformity. It is the intent of the instructor to conduct the course in a way that is respectful to students regardless of their race, color, ethnicity, national origin, sex, pregnancy, sexual orientation, gender identity, religion, disability, age, genetic information, veteran status, marital status, and/or political affiliation. Intolerance is interlorable and will not be tolerated by the instructor. Students are expected to treat their fellow students with respect. No question is a bad question and it is not acceptable to marginalize other students.

Plagiarism

The university policies on cheating and plagiarism apply in this course. Except on designated group work, the expectation is that every student will do their own work. Students under suspicion of plagiarism for individual assignment submitted materials will be given an opportunity to defend themselves. If after defense the instructor still believes the work to be plagiarized the department chair will be notified and the grade evaluation for the assignment will be lowered to a value between 50% and 0% at the discretion of the instructor. If a second occurrence of plagiarism occurs, the student will receive an F for the course and the registrar’s office will be notified that the student is not permitted to withdraw from the course. In addition the department chair and dean will be notified.

Work Retainment

The CS and IS programs in the College of IS&T are accredited through ABET (the Accreditation Board for Engineering and Technology. This organization occasionally requires that we keep samples of student work.

The instructor may retain a copy of your exams (with names and any other identifying information removed) for accreditation or pedagogy purposes, unless you specify otherwise in writing.

In addition, the instructor retains the right to use any code or project artifacts developed in the course for pedagogy, research, or service learning purposes. Student web project code developed in the course may be used in future secure project development courses, by the instructor for research purposes, or by designated stakeholders.

License

Information Security Policy Copyright (C) 2017 Dr. Matthew L. Hale

Lesson content

Copyright (C) Dr. Matthew Hale 2017.

Creative Commons License
This lesson is licensed by the author under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.

Software affiliated with the course

This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.

This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details.

You should have received a copy of the GNU General Public License along with this program. If not, see http://www.gnu.org/licenses/.

What does GPLv3 mean?

tl;drLegal summary

About

This repo contains a digitized version of the course content for CYBR3600 (Information Security Policy) at the University of Nebraska at Omaha.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages