Course Overview
Both public- and private-sector organizations are increasingly treating cyber-security issues as top-level risks. Major data breaches at companies such as Target and information security leaks such as those by Edward Snowden have enormous impacts on organizations. This course examines strategies for managing information security risks, developing knowledge suitable for a range of organizational roles such as board of directors, top management, chief information security officers, and persons reporting to such actors. The course examines the challenge of constructing and complying with Federal, State, local and organizational information security policies and legislation. It also examines key public policy cyber-security issues, recognizing the need for public-private partnerships, legislation, international coordination, and other systemic approaches for managing these risks. More generally, the course seeks to develop the multi-disciplinary thinking that will take account of the technology, business strategy, policy, and law of information security.
SYLLABUS
This mixed undergraduate- and graduate-level course takes a multi-disciplinary approach to the study of information security – a current topic of intensive research, system implementation, standards development, and public policy debate. The course is primarily lecture-based, with Socratic discussion of assigned readings, as well as active student participation via lively discussions and debates. Class sessions often include small-group, in-class activities to ensure hands-on experience in apply the concepts presented during lectures. There are no pre-requisites for this course, and students from varied backgrounds are welcome in the course. This course features a collaboration with an Atlanta-based company where students will analyze real-world security events along with their coursework to develop security policies that will bring students closer to being practicing security professionals. The course also features semester-long attention to security issues in the development of augmented reality systems, as an example of cutting-edge information security issues. The professors draw on their extensive experience in information technology, as well as the business, government, and legal aspects of current cyber-security debates.
Objectives
This course will enable students to understand how and why information security strategies and policy are developed and managed. Specific objectives include:
Understanding the legal and policy issues surrounding technologies that protect intellectual property, sensitive information, and other organizational information assets;
Understanding the role of technical standards to supplement legal and regulatory requirements;
Analyzing data breaches and related events to design and implement organizational strategies to address such risks;
Understanding the tensions between information security and usability;
Understanding the tensions between information security and privacy;
Developing the multidisciplinary skills needed to analyze, manage, and resolve the challenges associated with information security law and policy;
Gaining a basic grounding for future technical and other research in security policy via the examination of current research issues and problems; and
Gaining experience handling real-world security policy challenges through analysis of software and business artifacts using written and oral communication.
Projects
There will be three projects in the course, with the precise content developed close to the beginning of the semester in order to take advantage of current developments:
Information security law and policy paper. Students will be assigned to write a paper on a current information security law or policy issue. For this paper, the student will first argue the case for one stakeholder in the debate, and then argue for an opposing view, before concluding with a brief discussion of the student’s own view. The paper length for undergraduates will be at least 1,200 words and no more than 1,800 words. The paper length for graduate students will be at least 1,800 and no more than 2,700 words. A model paper for the format will be provided on T-Square. Due date: February 23.
Data breach and company strategy. Based on the presentation of an actual data breach by an Atlanta-based company, students will work in small teams to develop a company policy/strategy to address information security risks in the wake of a major data breach. Due date: March 31.
Augmented reality security project. Drawing on the augmented reality expertise of Professor MacIntyre, teams of students will conduct a security assessment of a technical artifact that could be incorporated into an augmented reality system in a home or business. Due date: April 20.
Project Presentation
During the last week of class, each student will give an oral presentation in which they will describe one of their projects and what they learned in the course. Length of presentations will depend upon course enrollment.
Evaluation Procedures
Final grades in the course will be determined as follows:
Law and policy project 25%
Data breach project 25%
Augmented reality project 25%
Reviews of reading 15%
Class attendance 5%
Project presentation 5%