1. General
SCHOOL |
SCHOOL OF ECONOMIC SCIENCES |
||||
ACADEMIC UNIT |
DEPARMENT OF ACCOUNTING AND FINANCE |
||||
LEVEL OF STUDIES |
Undergraduate |
||||
COURSE CODE |
BA802 |
SEMESTER |
8 | ||
COURSE TITLE |
INFORMATION SYSTEMS SECURITY | ||||
INDEPENDENT TEACHING ACTIVITIES |
WEEKLYTEACHING HOURS |
CREDITS | |||
Lectures | 2 | ||||
Hours Lab | 1 | ||||
Hours Exercises | 0 | ||||
Total |
3 | 6 | |||
COURSE TYPE | Specialization | ||||
PREREQUISITE COURSES | No | ||||
LANGUAGE OF INSTRUCTION and EXAMINATIONS | Greek | ||||
IS THE COURSE OFFERED TO ERASMUS STUDENTS | Yes (upon request) | ||||
COURSE WEBSITE (URL) |
https://
eclass.uowm.gr/courses/BA153/
|
2. LEARNING OUTCOMES
Learning outcomes |
|
The purpose of this course is to provide a thorough introduction to the security of computers, information systems and networks. The student is expected to design and create a set of functional and secure systems along with other techniques to control these systems. In addition, the student will be introduced to biometric identification, security and control systems. Upon successful completion of the course, the student will be expected to: 1. Design secure Information Systems 2. Create secure Information Systems 3. Analyse - identify potential risks to Information Systems 4. Develop security methods and systems 5. Organize and formulate security procedures 6. Monitor, analyse and evaluate the performance of information systems |
|
General Competences |
|
Upon completion of the course, the student will be able to: - Search, analyze and synthesize data and information, using the necessary technologies - Adapt to new situations and changing conditions - Making decisions - Working autonomously - Working in teams - Working in an international environment - Working in an interdisciplinary environment - Generating new research ideas - Project planning and management - Exercising criticism and self-criticism - Promoting free, creative and deductive thinking - Taking initiatives - Administration and management |
3. SYLLABUS
- Establishing the concepts and terms of Information Systems and Infrastructure Security - Current approaches and models in security & risk management - Access Control Mechanisms and Information Security Policies - Operating Systems & Database Security Standards - Malware & Practical tools and techniques to deal with Viruses, Worms, Spyware, Phishing etc. - Fundamentals of Cryptography (Symmetric / Asymmetric Cryptography, Public Key Infrastructure (PKI) - Internet & Electronic Transactions Security - Information Systems Risk Analysis and Risk Management (Methods & Techniques) - Economic dimension of IS security (techno-economic analysis & risk assessment - design and development of secure products). - Biometric Systems - Legal and Social Issues arising from data protection (Legal Protection of Personal Life - Protection of Citizen from processing of personal information, Regulatory framework in Greece, OECD and EU Directives). |
4. TEACHING and LEARNING METHODS - EVALUATION
DELIVERY |
Live lectures | ||||||||||||||||||||||||
USE OF INFORMATION AND COMMUNICATIONS TECHNOLOGY |
Power point slides Internet security software Support of the learning process through the e-class platform |
||||||||||||||||||||||||
TEACHING METHODS |
|
||||||||||||||||||||||||
STUDENT PERFORMANCE EVALUATION |
Laboratory work. Presentation - Evaluation 30%. Final Examination - Multiple-choice test 70%. |
5. SUGGESTED BIBLIOGRAPHY
-Suggested bibliography: |
- Information Systems Security, 5th Edition, Authors: Pfleeger P. Charles, Pfleeger Shari Lawrence, Margulies Jonathan, ISBN: 978-960-418-600-6 ISBN: 978-960-418-600-6. Information Systems Security, Sect. Katsikas - D. Gridzalis - Stef. Grigazalis - INFORMATION SYSTEMS SECURITY, PANGALOS GEORGIOU, MAVRIDIS I. |
-Related academic journals: |
• International Journal of Information Security • International Journal of Security and Networks • International Journal of Security and its Applications • International Journal of Communication Networks and Information Security • International Journal of Information and Computer Security |