Seminar in Archives & Records Management
Topic: Information Assurance
Spring 2017 Syllabus
Canvas Login and Tutorials
Canvas Information: Courses will be available beginning January 26th, 6 am PT unless you are taking an intensive or a one unit or two unit class that starts on a different day. In that case the class will open on the first day that the class meets.
You will be enrolled into the Canvas site automatically.
An overview of Information Assurance and Risk Management theories, principles, and techniques. This course examines the information assurance frameworks and risk management planning structures used to ensure that an organization’s information resources and assets are protected.
Course Calendar and Requirements
Grading will be based on a total accumulation of possible 100 points, distributed as follows:
- Class Participation and Discussion - 30 points (30% of final grade)
(Supports CLOs #1-2)
Participation in weekly discussion boards
- Assignment #1 – 20 points (20% of final grade)
(Supports CLOs #2)
The Information Assurance/Security Risk Identification, Assessment, Response, Mitigation and Control Assignment
Due: Feb 26 (11:59 pm pacific time)
- Assignment #2 – 20 points (20% of final grade)
(Supports CLOs #1)
The History and Development of Security Technology Assignment
Due: Mar 12 (11:59 pacific time)
- Final Course Assignment - Research Paper – 30 points (30 % of final grade)
(Supports CLOs #1-2)
A critical extended essay of 15-20 pages on a topic relevant to the course proposed by the student and accepted by the instructor.
- Due: Topic Instructor Approval April 9 (11:59 pm pacific time)
- Due: Preliminary Citations April 26 (11:59 pm pacific time) 5pt
- Due: Final Paper May 14 (11:59 pm pacific time) 25pts
- Mid-Course Review and Reflections Assignment
(Supports CLOs #1-2)
Due: Week 7
|1||1/26-2/5||Introductions; Course Overview; Course Learning Objectives and Outcomes. Introduction to Information Assurance & Information Security|
|2||2/6-2/12||Information Assurance Governance & Frameworks|
|3||2/13-2/19||Information Assurance and Risk Management|
|4||2/20-2/26||Threats and Vulnerabilities (People Process & Technologies)
Due: Feb 26 (11:59 PM Pacific Time)
|5||2/27-3/5||Information Assurance and Legal and Ethical Considerations|
|6||3/76-3/12||Global National Security; Information Assurance Issues; Information Assurance Standards
Due: Mar 12 (11:59 PM Pacific Time)
|7||3/13-3/19||Network, Application and Software Security
Course Review/ Reflections
|8||3/20-3/26||Access Control Management and Authentication|
Final Assignment Topic Approval
Due: Apr 9 (11:59 PM Pacific Time)
|11||4/10-4/16||Business Continuity Planning|
|12||4/17-4/23||Physical (Environmental) Security
Final Topic – Preliminary Reference List
Due: Apr 23 (11:59 PM Pacific Time)
|13||4/24-4/30||Information Assurance Education, Training and Awareness|
|14||5/1-5/7||Information Assurance Compliance, Auditing and Control Monitoring|
|15||5/8-5/16||Information Assurance and Evolving Technology Trends
Due: May 14 (11:59 PM Pacific Time)
Late assignments will not be accepted after 5 days past the due date. Late assignments submitted after the assignment deadline will receive a 10% point reduction for each day up to 5 days based on the total point value of the assignment. No points will be awarded after 5 days late.
Discussion board postings will not be accepted for credit after the module's discussion has ended.
All course materials must be completed by the last day of the class.
NOTE: Students should provide their initial discussion board posts by the first Thursday of each module by 11:59 pm (Pacific Time), to leave ample time for follow-up discussion. Please participate early and actively in the required discussions.
Details for all of the discussions and assignments will be provided in Canvas.
Unless otherwise noted, each module begins on Monday and ends on Sunday. Assignments will be due by 11:59 pm (Pacific Time) on the due date.
Course Workload Expectations
Success in this course is based on the expectation that students will spend, for each unit of credit, a minimum of forty-five hours over the length of the course (normally 3 hours per unit per week with 1 of the hours used for lecture) for instruction or preparation/studying or course related activities including but not limited to internships, labs, clinical practica. Other course structures will have equivalent workload expectations as described in the syllabus.
Instructional time may include but is not limited to:
Working on posted modules or lessons prepared by the instructor; discussion forum interactions with the instructor and/or other students; making presentations and getting feedback from the instructor; attending office hours or other synchronous sessions with the instructor.
Student time outside of class:
In any seven-day period, a student is expected to be academically engaged through submitting an academic assignment; taking an exam or an interactive tutorial, or computer-assisted instruction; building websites, blogs, databases, social media presentations; attending a study group;contributing to an academic online discussion; writing papers; reading articles; conducting research; engaging in small group work.
MARA 200, MARA 202, MARA 204 for all MARA students. These prerequisites are waived for non-MARA majors.
Course Learning Outcomes
Upon successful completion of the course, students will be able to:
- Design, support, and evaluate an Information Assurance (IA) Governance Program for an organization.
- Identify and assess information security and privacy risks/vulnerabilities and select and evaluate appropriate technical and business solutions to mitigate the risk for an organization.
Core Competencies (Program Learning Outcomes)
MARA 284 supports the following core competencies:
- D Have expertise in the basic concepts and principles used to identify, evaluate, select, organize, maintain, and provide access to records of current and enduring value.
- G Know the legal requirements and ethical principles involved in records management and the role the recordkeeper plays in institutional compliance and risk management.
- H Be conversant with current information technologies and best practices relating to records preservation and security.
- Whitman, M. E., & Mattord, H. J. (2016). Principles of information security (5th ed.). Boston, MA: Cengage Learning. Available through Amazon: 1285448367
The standard SJSU School of Information Grading Scale is utilized for all iSchool courses:
|97 to 100||A|
|94 to 96||A minus|
|91 to 93||B plus|
|88 to 90||B|
|85 to 87||B minus|
|82 to 84||C plus|
|79 to 81||C|
|76 to 78||C minus|
|73 to 75||D plus|
|70 to 72||D|
|67 to 69||D minus|
In order to provide consistent guidelines for assessment for graduate level work in the School, these terms are applied to letter grades:
- C represents Adequate work; a grade of "C" counts for credit for the course;
- B represents Good work; a grade of "B" clearly meets the standards for graduate level work;
For core courses in the MLIS program (not MARA or Informatics) — INFO 200, INFO 202, INFO 204 — the iSchool requires that students earn a B in the course. If the grade is less than B (B- or lower) after the first attempt you will be placed on administrative probation. You must repeat the class if you wish to stay in the program. If - on the second attempt - you do not pass the class with a grade of B or better (not B- but B) you will be disqualified.
- A represents Exceptional work; a grade of "A" will be assigned for outstanding work only.
Students are advised that it is their responsibility to maintain a 3.0 Grade Point Average (GPA).
Per University Policy S16-9, university-wide policy information relevant to all courses, such as academic integrity, accommodations, etc. will be available on Office of Graduate and Undergraduate Programs' Syllabus Information web page at: http://www.sjsu.edu/gup/syllabusinfo/. Make sure to visit this page, review and be familiar with these university policies and resources.
In order to request an accommodation in a class please contact the Accessible Education Center and register via the MyAEC portal.
Download Adobe Acrobat Reader to access PDF files.
More accessibility resources.