Outcomes

Cyber Security-Information Assurance Program Outcomes:

  • Apply standard statistical inference procedures to draw conclusions from data.
  • Demonstrate proficiency in the use of scripting languages to write simple scripts including simple linear and looping scripts.
  • Write simple and compound conditions within a programming language or similar environment.
  • Identify the bad actors/entities in cyberspace, compare and contrast their resources, capabilities/techniques, motivations, and aversion to risk.
  • Simulate different types of attacks and their characteristics.
  • List the first principles of security and describe why each principle is important to security and how it enables the development of security mechanisms that can implement desired security policies. Illustrate basic security design fundamentals that help create systems that are worthy of being trusted.
  • Describe potential system attacks and the actors/entities that might perform them and choose the appropriate cyber defense tools, methods and components to demonstrate cyber defense methods to prepare a system to repel attacks and deploy appropriate measures in the event of a system breach.
  • Demonstrate the fundamental concepts of information assurance/cyber defense that can be used to provide system security.
  • Construct the architecture of a typical, complex system and identify significant vulnerabilities, risks, and points at which specific security technologies/methods should be employed.
  • Describe strengths and weaknesses, modes, and issues that have to be addressed in an implementation and describe how cryptography can be used.
  • Use the hardware components of modern computing environments and their individual functions.
  • Describe and apply the fundamental and higher concepts, technologies, components and issues related to communications and data networks.
  • List the applicable laws and policies related to cyber defense and describe the major components of each pertaining to the storage and transmission of data.
  • Describe the responsibilities related to the handling of information about vulnerabilities and how the type of legal dispute including civil, criminal, and private affects the evidence used to resolve industry wide issues.
  • Apply the knowledge gained to successfully install and securely configure, operate and maintain a commodity operating system.