CIS8630_Syllabus - Georgia State University Department of...

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
Georgia State University Department of Computer Information Systems Course Syllabus CIS8630 (CRN xxxxx) Business Computer Forensics and Incident Response Spring 2010 Instructors : Name Richard Baskerville Office RCB Building, 35 Broad Street, 919 Office Hours Thursdays, 1.30 pm – 3.30 pm, or by appointment Office Phone (404) 413-7362 Office Fax (404) 413-7394 Email baskerville@acm.org Venue TBA Prerequisites CIS 8080 or ACCT 8680 CSP 1, 6, 7. Required Materials Computer storage media, such as 3.5” floppy disks, thumbsticks, blank data CDs, etc. as described in labs. Readings Bunting, S. EnCase Computer Forensics--The Official EnCE: EnCase Certified Examiner Study Guide Wiley Publishing, Indianapolis, 2008. Rowlingson, R. "A Ten Step Process for Forensic Readiness," International Journal of Digital Evidence (2:3) 2004, pp 1-28. Luoma, V.M. "Computer forensics and electronic discovery: The new management challenge," (25:2) 2006, pp 91-96. Volonino, L., Anzaldua, R., and Godwin, J. Computer Forensics: Principles and Practices Pearson Education, Upper Saddle River, New Jersey, 2007. Volonino, L., Sipior, J. C., & Ward, B. T. (2007). Managing the Lifecycle of Electronically Stored Information. Information Systems Management, 24 (3), 231-238.
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Page 2 Catalog Description This course provides a strategic exploration into the prevention and response to intentional abuse of business information systems. This abuse frequently leads to diversion of resources, interruptions of service and corruption of data that develops into a variety of losses that can seriously impair an organizations performance. Students will be prepared to plan and manage organizational incident and forensics preparedness, including information security policies, information controls, information practices, incident response plans, forensic readiness, and preservation of evidence in the form of electronically stored information. The course includes experiments in the use of forensics tools for investigation of organizational policy violations. Course Objectives Through successful completion of this course, students will develop abilities to 1. Explain the organizational relationship between activities directed toward policy enforcement, computer forensics, data recovery, incident response, and privacy protection. 2. Plan strategies for information systems control governance and policy enforcement. 3. Plan strategies for organizational readiness for computer incident response such that collection, preservation, presentation and preparation of computer-based evidence will optimally satisfy the requirements of business continuity, criminal law enforcement and civil litigation. 4.
Background image of page 2
Image of page 3
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 05/04/2010 for the course MATH 1101 taught by Professor Staff during the Winter '08 term at Georgia State University, Atlanta.

Page1 / 7

CIS8630_Syllabus - Georgia State University Department of...

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online