Skip to Main Content
Idaho State University home

INFO 5511 Intermediate Information Assurance 3 Credits

Course Designator INFO 5511
Course Title: Intermediate Information Assurance
Course Length: 45 contact hours during 15 weeks
Course Description: Focuses on homeland security, information assurance, integrity, control, and privacy. Covers CNSS-4011, NIST-800-16 standards, national policy, and international treaties. The course considers Software Deployment, Operations, Maintenance and Disposal, including security issues around steady state operations and management of software, as well as security measures that must be taken when a product reaches its end of life. PREREQ: INFO 2285 or CS 2275 or INFO 3310, or permission of instructor. D
Prerequisites Junior Standing and database course, any law course or INFO 3310; or instructor permission
Course Learning Objective: The original McCumber model is used to provide a framework for the student. The student will be able to create a security plan, explain and discuss access control and building secure systems.
Major Topics:
  1. Introduction to Computer Security
    1. Computer Security definition, laws, historical perspective
  2. Access Control
    1. Identification and Authentication; Discretionary Access Control
    2. Mandatory Access Control and Supporting Policies
  3. Building Secure Systems
    1. Design and implementation concepts that support assurance
  4. Malicious Software and Intrusion Detection
    1. Trojan horses, viruses, worms, etc.
  5. Certification and Accreditation, Disaster Planning and Recovery and Risk Analysis
    1. Certification and accreditation issues
  6. Basics of Cryptography
    1. Private key, public key and hashing schemes
  7. Cryptographic Protocols and Applications
    1. Cryptographic protocols for providing secrecy, integrity and authentication
  8. Network Security
    1. Special considerations, combining access control and cryptography
  9. Network Security in Today’s Environment
    1. TCP/IP, Internet and firewalls
  10. Building Secure Systems II
    1. * System evaluation issues
Method of Instruction: This is a lecture course involving planning and implementation issues associated with Information Assurance. The student will have limited hands on and research activities. The student is required to develop a research paper that is part of the class discussion.
Evaluation Methods: As an introductory course, the student is evaluated predominantly by examination and by evaluation of a research paper. The examinations cover the fundamental understanding of the vocabulary of Information Assurance. The research paper allows the student to focus on specific issues.
Student Enrollment:  

The course materials are keyed directly to NSTISSI 4011 including topics such as Hostile Intelligence Service (HOIS), malicious logic, hackers, environmental and technological hazards, disgruntled employees, careless employees, HUMINT, and monitoring

NIATEC National Science Foundation Information Assurance Directorate Department of Homeland Security CISSE Scholarship For Service