[ Skip Main Nav ]

University of Phoenix

http://www.phoenix.edu

Cyber Crime And Information Systems Security –

cja570

(3 credits)

This course provides an overview of the nature of criminal activity that is facilitated, through or that targets, information systems. The course also reviews security measures that are designed to protect the software, hardware and data associated with information systems.
This graduate-level course is 6 weeks. To enroll, speak with an Enrollment Advisor.
  • Overview of Information Systems and Technology

    • Identify the various components of information systems and their functionality.
    • Describe the global interconnectivity of information systems.
    • Assess the depth and breadth of the effect of a failure of a major component of a complex system.
    • Explain the reasons for the protection of information systems and the consequences of inadequate security.
  • Cybercrime Trends

    • Discuss the recent crime trends in cyberspace.
    • Analyze the criminal intent and methodologies involved in the utilization of information systems to perpetrate specific types of crimes.
    • Evaluate the motives and methods of individuals or organizations that target various information systems for infiltration or destruction.
  • Information Technology Threats and Risks

    • Describe the principles of risk management as they pertain to information systems and technology.
    • Explore the vulnerabilities of information systems.
    • Identify the risks and impacts pertaining to computers as well as risk mitigationand risk evaluations.
    • Analyze the nature of potential internal and external threats, as well as natural or unintended events that can jeopardize information systems.
  • Governmental Issues and Internal Policies

    • Analyze the nature of government regulations imposed upon administrators of information systems and their impact on the distribution of information and related security issues.
    • Evaluate the need for various internal and external policies and procedures designed to promote protection of both the hardware, software, and data related to information systems.
    • Identify the policies that govern the levels of access security.
    • Determine organizational structures, necessary authority and assignment of responsibilities and accountabilities to insure optimal security of information systems.
  • Protection and Recovery of Information

    • Compare and contrast the strengths and weaknesses of contemporary methodologies and technologies designed to protect information systems and data.
    • Create strategies for restoration of information system operations in the event of an attack or failure and for the recovery of data that may be stolen, altered or destroyed.
    • Explain the various issues associated with the failure of information systems at local, state, and national levels of society.
  • Predictions, Trends, and Initiatives to Combat Cybercrime

    • Assess the nature and extent of the reliance of various social institutions on information systems and technology.
    • Critique the laws and various enforcement mechanisms designed to discourage crimes against information systems.
    • Discuss the future challenges faced by law enforcement personnel regarding cybercrime and systems security.
    • Assess sentencing guidelines, punishment, and fines targeting cybercriminals.

We're here to help

  • Request more information
  • Live Chat
  •  

Learn more today

Find out how we can help you meet your goals. Not all courses are available to residents of all states. Ask your Enrollment Advisor for details.

Loading...
It looks like you are using
Enhance your Phoenix.edu experience

You're using an older browser (a software program used to explore the web) which is not optimal for viewing the University of Phoenix website. Consider downloading a new browser to maximize your experience on this and other websites. Your new browser should display web pages properly, increase your web surfing speed and enhance your security.

©2006-2011 University of Phoenix, Inc. All rights reserved.