Depth examination of methods for protecting assets stored in electronic information systems, in transit over digital networks (e.g., the Internet, Ethernet), and in cyber-physical assets (such as autonomous vehicles and electric turbines). Broad range of security management topics, including relative security of digital communications options (such as email, text, fax, VPN, web portals plus Bring Your Own Device vulnerabilities); corporate managerial reporting structures that promote or retard effective security management; contractual terms and management of third-party technical service and products suppliers, such as for cloud computing and security monitoring; procurement and endpoint security management strategies; special security problems posed by the millions of insecure devices that are typed the Internet of Things (IoT). Latter weeks examine the threat landscape and particular security regulatory requirements that have been imposed on major business sectors, including financial (banking and insurance), energy, and health care. Guest security & legal experts from each sector discuss their threat landscape, regulatory environment, and major security management, risk, and liability issues. The course does not assume prior technical or computer knowledge but Cybersecurity & Privacy Protection I (L666) is helpful background. For those considering a career in the cybersecurity, cyber risk management, or privacy protection areas, the course functions as a foundational prerequisite for advanced coursework and externships in the field.
Cybersecurity II
Course number
LAW 746
Credit hours
3 Credit Hours
Description