Skip to Main Content


Master Syllabus

Print this Syllabus « Return to Previous Page

Administrative Unit: Computer and Mathematical Sciences Department
Course Prefix and Number: CISS 391
Course Title: Information Systems Security
Number of:
Credit Hours 3
Lecture Hours 3
Lab Hours 0
Catalog Description:

Introduction to information systems security issues associated with formal and informal systems’ protection, detection and responses. Prerequisite:  Junior standing.

Prerequisite(s) / Corequisite(s):

Junior standing.

Course Rotation for Day Program: Offered odd Fall.
Text(s): Most current editions of the following:

Principles of Information Systems Security: Texts and Cases
By Dhillon, Gurpreet (Wiley)
Fundamentals of Secure Computer Systems
By Tjaden, Brett (Franklin, Beedle, & Associates)
Introduction to Computer Security
By Bishop, Matt (Addison Wesley)
Principles of Information Security
By Whitman, M.E. and Mattord, H.J. (Course Technology)
Course Objectives
  • To understand the fundamental concepts and terminologies of information systems security.
  • To identify the security risks associated with information systems.
  • To describe major technologies that are used to secure a network and its resources.
  • To identify current technologies used in the field of information systems security.
  • To examine the tools that are used to compromise systems in order to create better defense measures.
  • To use the appropriate security policies and technology to best meet security requirements.
  • To understand the trade-offs between usability and security.
    Measurable Learning
  • Explain roles of information systems security.
  • Use available tools to protect, detect, and respond to attacks.
  • Write security policy.
  • Integrate security with systems design.
  • Provide training guideline for business.
  • Discuss risk analysis.
    Topical Outline:
  • The need for security
  • Security policy and planning
  • Risk management
  • Security technology
  • Cryptography
  • Software, hardware, physical security
  • Security implementation
  • Personnel security
  • Security maintenance

    Recommended maximum class size for this course: 20

    Library Resources:

    Online databases are available at You may access them using your CougarTrack login and password when prompted.

    Prepared by: Youlong Zhuang Date: November 4, 2011
    NOTE: The intention of this master course syllabus is to provide an outline of the contents of this course, as specified by the faculty of Columbia College, regardless of who teaches the course, when it is taught, or where it is taught. Faculty members teaching this course for Columbia College are expected to facilitate learning pursuant to the course objectives and cover the subjects listed in the topical outline. However, instructors are also encouraged to cover additional topics of interest so long as those topics are relevant to the course's subject. The master syllabus is, therefore, prescriptive in nature but also allows for a diversity of individual approaches to course material.

    Office of Academic Affairs