BMIS 664 Information Forensics, Compliance and Risk Management
Course Description
For information regarding prerequisites for this course, please refer to the Academic Course Catalog.
Course Guide
View this course’s outcomes, policies, schedule, and more.*
*The information contained in our Course Guides is provided as a sample. Specific course curriculum and requirements for each course are provided by individual instructors each semester. Students should not use Course Guides to find and complete assignments, class prerequisites, or order books.
Rationale
Competitive firms today will have the ability to proactively identify and prevent information loss. Such losses can occur by security breaches, poorly planned information systems, and by the lack of managerial guidance. To ensure a firm is compliant and prepared for information threats, risks need to be identified and prevented. Additionally, countermeasures must be implemented to mitigate and manage the potential future loss of pertinent data and information. BMIS 664 prepares the student to address such activities by examining the topics of information forensics, compliance, and risk management in greater detail.
Course Assignment
Textbook readings and lecture presentations
No details available.
Course Requirements Checklist
After reading the Course Syllabus and Student Expectations, the student will complete the related checklist found in the Course Overview.
Discussions (8)
Discussions are collaborative learning experiences. Therefore, the student will write a thread containing scholarly supported answers to 2 questions from the assigned module/week’s textbook readings. If necessary, the student may list within his/her threads any concepts on which he/she needs further clarification. The student must also reply to at least 2 classmates’ threads using scholarly support. The student may reply to a classmate’s request for clarification as 1 of his/her 2 required replies. The initial post in total must be at least 500 words and include a minimum of 2 unique and relevant scholarly peer-reviewed journal articles. Each reply must contain at least 200 words and 1 journal article specific to the author’s post and topic.
Information Controls Project Assignment
The student will submit a properly formatted APA paper containing screenshots of the network security threat assessments on two different operating systems (at least one being Linux), an evaluation of at least four different cyber security threats using four unique IT controls, application of appropriate frameworks such as COBIT or COSO, an evaluation of the effectiveness of the framework and IT controls in assessing each of the cyber security threats on the two different operating systems, application of four common security tools that can be used to address each of the four different cyber security threads on the two different operating systems, and an explanation of the advantages and disadvantages of each type analysis performed on the selected threats using Kali Linux or an alternative ethical hacking operating system. The final submission must be a minimum of 1,800 words and must contain at least 7 peer-reviewed sources.
Network Security Threat Project Assignment
The student will submit a properly formatted APA paper containing screenshots of the network security threat assessments on the two different operating systems (at least one being Linux), an assessment of the overall severity of the mentioned threats, an explanation of what can be done to mitigate/respond to these threats, a review of which safeguards the organization could implement to guard against these attacks, and a well-supported report regarding the most advantageous safeguard/mitigating factors of the network security threats the project addresses. The final submission must be a minimum of 1,800 words and must contain at least 7 peer-reviewed sources.
Threat Interception Project Assignment
The student will submit a properly formatted APA paper containing screenshots of the network security threat assessments on the two different operating systems (at least one being Linux), justification and use of appropriate security tools to demonstrate and evaluate the vulnerability of intercepting information from each of the four networking protocols, a review of which safeguards the organization could implement to guard against these attacks, and a well-supported report regarding the most advantageous safeguard/mitigating factors of the network security threats your project addresses. The final submission must be a minimum of 1,800 words and contain at least 7 peer-reviewed sources.
Final Project Assignment
The student will be placed in a hypothetical scenario in which an organization has been attacked and unauthorized funds have been transferred. The student must utilize all of the information gained throughout the course to successfully complete the project. The final submission will be at least 5,000 words and contain at least 20 peer-reviewed sources.
Quizzes (3)
Each quiz will cover the Learn material up to and including the module: week in which it is assigned. Each quiz will include 12 multiple-choice questions, be limited to 10 minutes, allow one attempt, and be open-book/open-notes.
Quiz: Midterm
The exam will cover the Learn materials up to and including the module: week in which it is assigned. The quiz will contain 68 multiple-choice questions, be limited to one hour, allow one attempt, and be open-book/open-notes.

Have questions about this course or a program?
Speak to one of our admissions specialists.
Inner Navigation
Have questions?