Loading…
Maximizing business information security's educational value
A business information security course's goals and objectives are quite different from most traditional security courses, which focus on designing and developing new security technologies. Business information security primarily concerns the strategic, tactical, and operational management issue...
Saved in:
Published in: | IEEE security & privacy 2004-01, Vol.2 (1), p.56-60 |
---|---|
Main Author: | |
Format: | Magazinearticle |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | cdi_FETCH-LOGICAL-c356t-4926959682299fb4c69567828848f51030338f294430ca1c404f654dd0fa93163 |
---|---|
cites | cdi_FETCH-LOGICAL-c356t-4926959682299fb4c69567828848f51030338f294430ca1c404f654dd0fa93163 |
container_end_page | 60 |
container_issue | 1 |
container_start_page | 56 |
container_title | IEEE security & privacy |
container_volume | 2 |
creator | Grimaila, M.R. |
description | A business information security course's goals and objectives are quite different from most traditional security courses, which focus on designing and developing new security technologies. Business information security primarily concerns the strategic, tactical, and operational management issues surrounding the planning, analysis, design, implementation, and maintenance of an organization's information security program. Core issues include asset valuation, auditing, business continuity planning, disaster recovery planning, ethics, organizational communication, policy development, project planning, risk management, security awareness education and training, and various legal issues such as liability and regulatory compliance. Because businesses can't afford to mitigate all security risks, students must learn methods to identify and justify the optimal amount of expenditures to ensure that their information assets are sufficiently protected. Students should also understand the technical components of security so they can appreciate the problems experienced by the people they manage. This paper describes my experiences in developing a business information security course that provides students the knowledge arid experience to succeed in today's competitive information-intensive corporate environment. |
doi_str_mv | 10.1109/MSECP.2004.1264855 |
format | magazinearticle |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_1136361551</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>1264855</ieee_id><sourcerecordid>28769341</sourcerecordid><originalsourceid>FETCH-LOGICAL-c356t-4926959682299fb4c69567828848f51030338f294430ca1c404f654dd0fa93163</originalsourceid><addsrcrecordid>eNp9kE1LAzEQhoMoWKt_QC-LB_WyNZOvJuBFSv2AFgX1HNI0kZTtbk12xfrr3W0LggdPmWSed5g8CJ0CHgBgdT19GY-eBwRjNgAimOR8D_WAc5kzzMR-VzOcD5Wih-gopQXGBIDLHrqZmq-wDN-hfM9mTQqlSykLpa_i0tShKrPkbBNDvb5MmZs3dvNoiuzTFI07RgfeFMmd7M4-ersbv44e8snT_ePodpJbykWdM0WE4kpIQpTyM2bbmxhKIiWTngOmmFLpiWKMYmvAtit7wdl8jr1RFATto4vt3FWsPhqXar0MybqiMKWrmqSJHApFGbTg1b8gABVUtF469PwPuqia2H4taUWwlIClaiGyhWysUorO61UMSxPXGrDuxOuNeN2J1zvxbehsGwrOud_ArvsDUwJ8gw</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>magazinearticle</recordtype><pqid>920881089</pqid></control><display><type>magazinearticle</type><title>Maximizing business information security's educational value</title><source>IEEE Electronic Library (IEL) Journals</source><creator>Grimaila, M.R.</creator><creatorcontrib>Grimaila, M.R.</creatorcontrib><description>A business information security course's goals and objectives are quite different from most traditional security courses, which focus on designing and developing new security technologies. Business information security primarily concerns the strategic, tactical, and operational management issues surrounding the planning, analysis, design, implementation, and maintenance of an organization's information security program. Core issues include asset valuation, auditing, business continuity planning, disaster recovery planning, ethics, organizational communication, policy development, project planning, risk management, security awareness education and training, and various legal issues such as liability and regulatory compliance. Because businesses can't afford to mitigate all security risks, students must learn methods to identify and justify the optimal amount of expenditures to ensure that their information assets are sufficiently protected. Students should also understand the technical components of security so they can appreciate the problems experienced by the people they manage. This paper describes my experiences in developing a business information security course that provides students the knowledge arid experience to succeed in today's competitive information-intensive corporate environment.</description><identifier>ISSN: 1540-7993</identifier><identifier>EISSN: 1558-4046</identifier><identifier>DOI: 10.1109/MSECP.2004.1264855</identifier><identifier>CODEN: ISPMCN</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Business ; Business continuity ; Computer information security ; Continuing education ; Cost accounting ; Cybersecurity ; Data encryption ; Disaster management ; Education ; Ethics ; Information analysis ; Information security ; Network security ; Policies ; Professional communication ; Recovery planning ; Risk ; Risk management ; Security management ; Strategic planning ; Students</subject><ispartof>IEEE security & privacy, 2004-01, Vol.2 (1), p.56-60</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2004</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c356t-4926959682299fb4c69567828848f51030338f294430ca1c404f654dd0fa93163</citedby><cites>FETCH-LOGICAL-c356t-4926959682299fb4c69567828848f51030338f294430ca1c404f654dd0fa93163</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/1264855$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>780,784,27925,54796</link.rule.ids></links><search><creatorcontrib>Grimaila, M.R.</creatorcontrib><title>Maximizing business information security's educational value</title><title>IEEE security & privacy</title><addtitle>SECP-M</addtitle><description>A business information security course's goals and objectives are quite different from most traditional security courses, which focus on designing and developing new security technologies. Business information security primarily concerns the strategic, tactical, and operational management issues surrounding the planning, analysis, design, implementation, and maintenance of an organization's information security program. Core issues include asset valuation, auditing, business continuity planning, disaster recovery planning, ethics, organizational communication, policy development, project planning, risk management, security awareness education and training, and various legal issues such as liability and regulatory compliance. Because businesses can't afford to mitigate all security risks, students must learn methods to identify and justify the optimal amount of expenditures to ensure that their information assets are sufficiently protected. Students should also understand the technical components of security so they can appreciate the problems experienced by the people they manage. This paper describes my experiences in developing a business information security course that provides students the knowledge arid experience to succeed in today's competitive information-intensive corporate environment.</description><subject>Business</subject><subject>Business continuity</subject><subject>Computer information security</subject><subject>Continuing education</subject><subject>Cost accounting</subject><subject>Cybersecurity</subject><subject>Data encryption</subject><subject>Disaster management</subject><subject>Education</subject><subject>Ethics</subject><subject>Information analysis</subject><subject>Information security</subject><subject>Network security</subject><subject>Policies</subject><subject>Professional communication</subject><subject>Recovery planning</subject><subject>Risk</subject><subject>Risk management</subject><subject>Security management</subject><subject>Strategic planning</subject><subject>Students</subject><issn>1540-7993</issn><issn>1558-4046</issn><fulltext>true</fulltext><rsrctype>magazinearticle</rsrctype><creationdate>2004</creationdate><recordtype>magazinearticle</recordtype><recordid>eNp9kE1LAzEQhoMoWKt_QC-LB_WyNZOvJuBFSv2AFgX1HNI0kZTtbk12xfrr3W0LggdPmWSed5g8CJ0CHgBgdT19GY-eBwRjNgAimOR8D_WAc5kzzMR-VzOcD5Wih-gopQXGBIDLHrqZmq-wDN-hfM9mTQqlSykLpa_i0tShKrPkbBNDvb5MmZs3dvNoiuzTFI07RgfeFMmd7M4-ersbv44e8snT_ePodpJbykWdM0WE4kpIQpTyM2bbmxhKIiWTngOmmFLpiWKMYmvAtit7wdl8jr1RFATto4vt3FWsPhqXar0MybqiMKWrmqSJHApFGbTg1b8gABVUtF469PwPuqia2H4taUWwlIClaiGyhWysUorO61UMSxPXGrDuxOuNeN2J1zvxbehsGwrOud_ArvsDUwJ8gw</recordid><startdate>200401</startdate><enddate>200401</enddate><creator>Grimaila, M.R.</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>7SP</scope><scope>F28</scope><scope>FR3</scope><scope>KR7</scope></search><sort><creationdate>200401</creationdate><title>Maximizing business information security's educational value</title><author>Grimaila, M.R.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c356t-4926959682299fb4c69567828848f51030338f294430ca1c404f654dd0fa93163</frbrgroupid><rsrctype>magazinearticle</rsrctype><prefilter>magazinearticle</prefilter><language>eng</language><creationdate>2004</creationdate><topic>Business</topic><topic>Business continuity</topic><topic>Computer information security</topic><topic>Continuing education</topic><topic>Cost accounting</topic><topic>Cybersecurity</topic><topic>Data encryption</topic><topic>Disaster management</topic><topic>Education</topic><topic>Ethics</topic><topic>Information analysis</topic><topic>Information security</topic><topic>Network security</topic><topic>Policies</topic><topic>Professional communication</topic><topic>Recovery planning</topic><topic>Risk</topic><topic>Risk management</topic><topic>Security management</topic><topic>Strategic planning</topic><topic>Students</topic><toplevel>online_resources</toplevel><creatorcontrib>Grimaila, M.R.</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Xplore</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Electronics & Communications Abstracts</collection><collection>ANTE: Abstracts in New Technology & Engineering</collection><collection>Engineering Research Database</collection><collection>Civil Engineering Abstracts</collection><jtitle>IEEE security & privacy</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Grimaila, M.R.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Maximizing business information security's educational value</atitle><jtitle>IEEE security & privacy</jtitle><stitle>SECP-M</stitle><date>2004-01</date><risdate>2004</risdate><volume>2</volume><issue>1</issue><spage>56</spage><epage>60</epage><pages>56-60</pages><issn>1540-7993</issn><eissn>1558-4046</eissn><coden>ISPMCN</coden><abstract>A business information security course's goals and objectives are quite different from most traditional security courses, which focus on designing and developing new security technologies. Business information security primarily concerns the strategic, tactical, and operational management issues surrounding the planning, analysis, design, implementation, and maintenance of an organization's information security program. Core issues include asset valuation, auditing, business continuity planning, disaster recovery planning, ethics, organizational communication, policy development, project planning, risk management, security awareness education and training, and various legal issues such as liability and regulatory compliance. Because businesses can't afford to mitigate all security risks, students must learn methods to identify and justify the optimal amount of expenditures to ensure that their information assets are sufficiently protected. Students should also understand the technical components of security so they can appreciate the problems experienced by the people they manage. This paper describes my experiences in developing a business information security course that provides students the knowledge arid experience to succeed in today's competitive information-intensive corporate environment.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/MSECP.2004.1264855</doi><tpages>5</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1540-7993 |
ispartof | IEEE security & privacy, 2004-01, Vol.2 (1), p.56-60 |
issn | 1540-7993 1558-4046 |
language | eng |
recordid | cdi_proquest_miscellaneous_1136361551 |
source | IEEE Electronic Library (IEL) Journals |
subjects | Business Business continuity Computer information security Continuing education Cost accounting Cybersecurity Data encryption Disaster management Education Ethics Information analysis Information security Network security Policies Professional communication Recovery planning Risk Risk management Security management Strategic planning Students |
title | Maximizing business information security's educational value |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-02T20%3A13%3A16IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Maximizing%20business%20information%20security's%20educational%20value&rft.jtitle=IEEE%20security%20&%20privacy&rft.au=Grimaila,%20M.R.&rft.date=2004-01&rft.volume=2&rft.issue=1&rft.spage=56&rft.epage=60&rft.pages=56-60&rft.issn=1540-7993&rft.eissn=1558-4046&rft.coden=ISPMCN&rft_id=info:doi/10.1109/MSECP.2004.1264855&rft_dat=%3Cproquest_cross%3E28769341%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c356t-4926959682299fb4c69567828848f51030338f294430ca1c404f654dd0fa93163%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=920881089&rft_id=info:pmid/&rft_ieee_id=1264855&rfr_iscdi=true |