140 likes | 285 Views
ACG 6415. Advanced Accounting Information Systems Summer 2014. Course Objectives. A strong grounding in computer and network security. Learn the factors related to the plan-protect-respond cycle of IT security. An understanding of networking concepts.
E N D
ACG 6415 Advanced Accounting Information Systems Summer 2014
Course Objectives • A strong grounding in computer and network security. • Learn the factors related to the plan-protect-respond cycle of IT security. • An understanding of networking concepts. • You will learn of the importance of IT security to the accounting profession and of the various control frameworks that accountant's rely on for compliance. • This course is learning about defense so we will learn about many threats and how they exploit vulnerabilities but we will NOT be using these exploits in class.
Syllabus Highlights • Dr. Steven Hornik • email: shornik@ucf.edu • Course Webpage: http://acg6415.wikispaces.com/ • Office Hours: Monday and Wednesday 4:00 – 6:00; and by appointment • Office: BA1 432
Text Book • Corporate Computer and Network Security, 3rd Edition by Randall J. Boyle and Raymond R. Panko
Grade Components * In Class & FlipBoard
Grading Scale • A 4.00 100-93 • A- 3.75 92-90 • B+ 3.25 89-86 • B 3.00 85-83 • B- 2.75 82-80 • C+ 2.25 79-76 • C 2.00 75-73 • C- 1.75 72-70 • D+ 1.25 69-66 • D 1.00 65-63 • D- 0.75 62-60 • F 0.00 <59
Exams • Two Part Exams • 1st Part • Multiple choice • Matching • Time Limit ~ 75 minutes • 2nd Part • Short-answer / Essay (with Notes/Book) • Time Limit 3.5 hours • Exams can be taken in any order
FlipBoard • Our Magazine – CyberSecurity • Quick Demo… • In Class Discussions (Participation) • Security in the News
Security In The News • Locate an article/video, etc. related to a security breach • Add an article to our class FlipBoard • Provide a summary of what happened • Detail the breach that occurred • Provide a description of what control could have prevented/detected the breach • Quality counts • No duplicate articles allowed
Access Control Report • You have been hired to conduct an IT control review • Examine the office locations • Each office • Each Cubicle • Each room • Note controls in place • Note missing controls • Prepare report summarizing your findings • Include a table that shows: • Place Visited • Control found • Control Missing • Recommended Fix (if necessary)