11.07.2015 Views

Catalog - University of Maryland University College

Catalog - University of Maryland University College

Catalog - University of Maryland University College

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

INFA 630 Intrusion Detection and Intrusion Prevention (3)(Formerly CSMN 683.) An exploration <strong>of</strong> the theory andimplementation <strong>of</strong> intrusion detection and intrusion prevention.Topics include network-based, host-based, and hybrid intrusiondetection; intrusion prevention; attack pattern identification;deployment; response; surveillance; damage assessment;data forensics; data mining; attack tracing; system recovery; andcontinuity <strong>of</strong> operation. A specific project on intrusion detectionand prevention in a hypothetical scenario, based on the inputsfrom government agencies and commercial organizations, isassessed by a team <strong>of</strong> experts who are working in the field.INFA 640 Cryptology and Data Protection (3)(Formerly CSMN 681.) An overview <strong>of</strong> the theory <strong>of</strong> encryptionusing symmetric and asymmetric keys, current protocolsfor exchanging secure data (including the Data EncryptionStandard and the Advanced Encryption Standard), and securecommunication techniques. A review <strong>of</strong> the historical development<strong>of</strong> cryptographic methods and cryptanalysis tools isprovided. Public key infrastructure and the use <strong>of</strong> digital signaturesand certificates for protecting and validating data areexamined. Strategies for the physical protection <strong>of</strong> informationassets are explored.INFA 650 Computer Forensics (3)An introduction to the fundamental concepts behind the collectionand analysis <strong>of</strong> the digital evidence left behind in a digitalcrime scene. Topics include the identification, preservation,collection, examination, analysis, and presentation <strong>of</strong> evidencefor prosecution purposes. Discussion also covers the laws andethics related to computer forensics and challenges in computerforensics. Network forensics is briefly explored. A specific projecton computer or network forensics in a hypothetical scenario,based on the inputs from government agencies and commercialorganizations, is assessed by a team <strong>of</strong> experts who are workingin the field.INFA 660 Security Policy, Ethics, and the LegalEnvironment (3)(Formerly CSMN 685.) An overview <strong>of</strong> laws and ethics relatedto information assurance. The information security responsibilities<strong>of</strong> major domestic and international agencies (such as theFederal Bureau <strong>of</strong> Investigation, National Security Agency, andNational Institute <strong>of</strong> Standards and Technology) are reviewed.Topics include issues involving information security managementwithin an enterprise, such as suitable organizational policy,plans, and implementation strategies. Discussion also coversethical issues, such as monitoring employee computer use andproper limitations on the use <strong>of</strong> customer data.INFA 670 Information Assurance Capstone (3)Prerequisites: INFA 610, 620, 630, 640, 650, and 660 (3 creditsmay be taken concurrently). A study <strong>of</strong> information assurancethat integrates and applies concepts previously studied. Bestpractices and appropriate technologies to design, implement,manage, evaluate, and further improve information securityare explored. Emerging trends are analyzed to understand theirpotential effect on information security and assurance.INMS (Intelligence Management)INMS 600 Managing Intelligence Activities (3)An introduction to management issues associated with intelligenceactivities in national and homeland security, law enforcement,and the private sector. Intelligence is evaluated fromthe perspectives <strong>of</strong> its consumers in government and business.Topics include the historical issues that led to extensive oversight<strong>of</strong> intelligence agencies and laws restricting their activities.Discussion also covers recent changes in national intelligenceand current issues, such as the debate over security versus civilliberties and how to protect America from foreign espionageand exploitation.INMS 610 Intelligence Collection: Sources and Challenges (3)A study <strong>of</strong> the management challenges related to collectingintelligence for national security, law enforcement, and businesspurposes through case study analysis and planning exercises.Various problems with human source intelligence; open sourceintelligence; signals intelligence; imagery; technical intelligence;and the military’s intelligence, surveillance, and reconnaissance(ISR) approach are assessed. Discussion covers law enforcementand correctional sources and the integration <strong>of</strong> multisourcedintelligence. Topics include how requirements drive collectionefforts, the relationship between collection and analysis, and thecosts associated with collection <strong>of</strong> intelligence.INMS 620 Intelligence Analysis: Consumers, Uses,and Issues (3)An examination <strong>of</strong> the intelligence requirements <strong>of</strong> variousclients in government and the private sector. The various purposes<strong>of</strong> analysis—such as warning, policy planning, researchand development, systems or product planning, support forlaw enforcement and correctional agencies, support for operationalactivities, and investment— are examined. Discussioncovers managing analytical methodologies and techniques, aswell as dissent in analyses, and understanding the reasons forfailures. Case studies illustrate issues in analysis management.The conflict between intelligence analysts and decision makers atnational and local levels is explored.w w w.umuc.edu / grad 109

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!