CMSY 154 Protecting the Virtual Office

Recent developments on the Internet, such as Social Web and Virtual Worlds, have improved our ability to communicate globally, while increasing our access to larger amounts of business information. In addition to these positive changes, the Internet has also become a source of misinformation and various network security vulnerabilities. In this course, students will learn about both network and workstation-level threats, and how to protect against them. Familiarity with computer operating systems, security tools such as personal firewalls and virus protection, and basic file management skills and touch typing are strongly recommended for success in this course.

Credits

3

Hours Weekly

3 hours weekly

Course Objectives

  1. 1. Define system and network security.
  2. 2. Describe general risks of doing virtual business.
  3. 3. Identify the major software and hardware components of the virtual office infrastructure.
  4. 4. Describe the technical set-up requirements and choices for virtual office.
  5. 5. Identify major types of security threats and vulnerabilities for the home office.
  6. 6. Analyze security risks in a fictitious company and make recommendations to reduce risk.
  7. 7. Use a variety of tools to protect computer workstations, and SOHO networks.
  8. 8. Define a Virtual Private Network, including its features, components, and deployment.

Course Objectives

  1. 1. Define system and network security.
  2. 2. Describe general risks of doing virtual business.
  3. 3. Identify the major software and hardware components of the virtual office infrastructure.
  4. 4. Describe the technical set-up requirements and choices for virtual office.
  5. 5. Identify major types of security threats and vulnerabilities for the home office.
  6. 6. Analyze security risks in a fictitious company and make recommendations to reduce risk.
  7. 7. Use a variety of tools to protect computer workstations, and SOHO networks.
  8. 8. Define a Virtual Private Network, including its features, components, and deployment.