1. General

SCHOOL

SCHOOL OF ECONOMIC SCIENCES

ACADEMIC UNIT

DEPARMENT OF ACCOUNTING AND FINANCE

LEVEL OF STUDIES

Undergraduate

COURSE CODE

BA802

SEMESTER

8

COURSE TITLE

INFORMATION SYSTEMS SECURITY
INDEPENDENT TEACHING ACTIVITIES WEEKLYTEACHING
HOURS
CREDITS
Lectures 2
Hours Lab 1
Hours Exercises 0

Total

3 6
COURSE TYPE Specialization
PREREQUISITE COURSES No
LANGUAGE OF INSTRUCTION and EXAMINATIONS Greek
IS THE COURSE OFFERED TO ERASMUS STUDENTS Yes (upon request)

COURSE WEBSITE (URL)

https:// eclass.uowm.gr/courses/BA153/

2. LEARNING OUTCOMES

Learning outcomes

The purpose of this course is to provide a thorough introduction to the security of computers, information systems and networks. The student is expected to design and create a set of functional and secure systems along with other techniques to control these systems. In addition, the student will be introduced to biometric identification, security and control systems.

Upon successful completion of the course, the student will be expected to:
1. Design secure Information Systems
2. Create secure Information Systems
3. Analyse - identify potential risks to Information Systems
4. Develop security methods and systems
5. Organize and formulate security procedures
6. Monitor, analyse and evaluate the performance of information systems

General Competences

Upon completion of the course, the student will be able to:
- Search, analyze and synthesize data and information, using the necessary technologies
- Adapt to new situations and changing conditions
- Making decisions
- Working autonomously
- Working in teams
- Working in an international environment
- Working in an interdisciplinary environment
- Generating new research ideas
- Project planning and management
- Exercising criticism and self-criticism
- Promoting free, creative and deductive thinking
- Taking initiatives
- Administration and management

3. SYLLABUS

- Establishing the concepts and terms of Information Systems and Infrastructure Security
- Current approaches and models in security & risk management
- Access Control Mechanisms and Information Security Policies
- Operating Systems & Database Security Standards
- Malware & Practical tools and techniques to deal with Viruses, Worms, Spyware, Phishing etc.
- Fundamentals of Cryptography (Symmetric / Asymmetric Cryptography, Public Key Infrastructure (PKI)
- Internet & Electronic Transactions Security
- Information Systems Risk Analysis and Risk Management (Methods & Techniques)
- Economic dimension of IS security (techno-economic analysis & risk assessment - design and development of secure products).
- Biometric Systems
- Legal and Social Issues arising from data protection (Legal Protection of Personal Life - Protection of Citizen from processing of personal information, Regulatory framework in Greece, OECD and EU Directives).

4. TEACHING and LEARNING METHODS - EVALUATION

DELIVERY
Live lectures
USE OF INFORMATION AND COMMUNICATIONS TECHNOLOGY
Power point slides
Internet security software
Support of the learning process through the e-class platform

TEACHING METHODS
Activity Semester workload
Lectures 26
Practise exercises 13
Exercises 48
Independent study 57
Course Total 144
Course total 288
STUDENT PERFORMANCE EVALUATION Laboratory work. Presentation - Evaluation 30%.
Final Examination - Multiple-choice test 70%.

5. SUGGESTED BIBLIOGRAPHY

-Suggested bibliography:
- Information Systems Security, 5th Edition, Authors: Pfleeger P. Charles, Pfleeger Shari Lawrence, Margulies Jonathan,
ISBN: 978-960-418-600-6 ISBN: 978-960-418-600-6.
Information Systems Security, Sect. Katsikas - D. Gridzalis - Stef. Grigazalis
- INFORMATION SYSTEMS SECURITY, PANGALOS GEORGIOU, MAVRIDIS I.
-Related academic journals:
• International Journal of Information Security
• International Journal of Security and Networks
• International Journal of Security and its Applications
• International Journal of Communication Networks and Information Security
• International Journal of Information and Computer Security

 

PHP Code Snippets Powered By : XYZScripts.com
Skip to content