SPECIALIZATION ELECTIVE
Credit Hours : 3
Synopsis
The goal of the course is to familiarize the students with basic concepts of data security and governance, their definitions, applications and current advances in the research community and industry. This course addresses data security and privacy issues in legacy systems and also studies data governance. Students will learn the processes and skills required to effectively manage data, whether big or small, traditional or digital. Students will learn about business practices, regulations, public policy, and technologies for both Information security and information privacy. Across a range of market sectors and application domains (such as healthcare, telecom, retail, IoT and financial services), the course will examine different types of threats and attacks , methods to detect data incidents and breaches, and respond to and recover from data incidents and breaches while managing risks and maintaining business continuity. Upon completion of the course a student is expected to understand the concept of privacy including personal private information, potential violations of privacy due to security mechanisms, an overview of the data governance field, and an appreciation of the problems that it addresses and means it uses to solve them.
Course Content
Information Inventory & Classification
Information as an Asset (and a Liability)
Three Tenets of Information Security - Confidentiality, Integrity, and Availability
Difference between security and privacy
Vulnerabilities, Threats, and Attacks
Security and Privacy Risk Assessment
Trusted Identity
Identity Construction
Lifecycle of an Identity
Access Control Models
Trust Frameworks
Levels of Assurance
Trust Frameworks: Stakeholders and Trust Framework Models
Security Policy and Governance
Privacy policy
Inference controls/statistical disclosure limitation
Backup policy, password refresh policy
Breach disclosure policy
Data collection and retention policies
Supply chain policy
Cloud security tradeoffs
Information System Security and Privacy : Design Principles
Information System Security and Privacy: Storing Information Assets (Cloud Migration)
References
Security in Computing by Charles Pfleeger, Shari Pfleeger, Jonathan Margulies. 5th Edition. Upper Saddle River, NJ: Prentice Hall, 2015.
Computer Security, 2nd Edition, Matt Bishop Pearson,2018.
Prepared By
En. Mohd Alif Hasmani