140 likes | 247 Views
ACG 6415. Advanced Accounting Information Systems Summer 2013. Course Objectives. A strong grounding in computer and network security. Learn the factors related to the plan-protect-respond cycle of IT security. An understanding of networking concepts.
E N D
ACG 6415 Advanced Accounting Information Systems Summer 2013
Course Objectives • A strong grounding in computer and network security. • Learn the factors related to the plan-protect-respond cycle of IT security. • An understanding of networking concepts. • You will learn of the importance of IT security to the accounting profession and of the various control frameworks that accountant's rely on for compliance. • This course is learning about defense so we will learn about many threats and how they exploit vulnerabilities but we will NOT be using these exploits in class.
Syllabus Highlights • Dr. Steven Hornik • email: shornik@ucf.edu • Course Webpage: http://acg6415.wikispaces.com/ • Office Hours:Monday - Thursday 2:30 – 4:00; and by appointment • Office: BA1 432
Text Book • Corporate Computer and Network Security, 3rd Edition by Randall J. Boyle and Raymond R. Panko
Grade Components • Exam 1 (Ch. 1 – 4, module A & Readings) 250 • Exam 2 (Ch. 5- 10 & Readings)250 • Access Control Simulation 100 • Security in the News100 • Participation 50 • Total Points750
Grading Scale • A 4.00 100-93 • A- 3.75 92-90 • B+ 3.25 89-86 • B 3.00 85-83 • B- 2.75 82-80 • C+ 2.25 79-76 • C 2.00 75-73 • C- 1.75 72-70 • D+ 1.25 69-66 • D 1.00 65-63 • D- 0.75 62-60 • F 0.00 <59
Exams • Two Part Exams • 1st Part • Multiple choice • Matching • Time Limit ~ 60 minutes • 2nd Part • Short-answer / Essay (with Notes/Book) • Time Limit 2.5 hours • Exams can be taken in any order
Wiki Pages to Update • Security in the News • FlipBoard • You will be contributing to a digital book/magazine • You will contribute an article related to IT Security • More on flipboard later….
Security In The News • Locate an article/video, etc. related to a security breach • Add an article to our class FlipBoard • Provide a summary of what happened • Detail the breach that occurred • Provide a description of what control could have prevented/detected the breach • Quality counts • No duplicate articles allowed
Access Control Report • You have been hired to conduct an IT control review • Examine the office locations • Each office • Each Cubicle • Each room • Note controls in place • Note missing controls • Prepare report summarizing your findings • Include a table that shows: • Place Visited • Control found • Control Missing • Recommended Fix (if necessary)