Information Security and Auditing (ISA)
Section outline
-
-
Welcome to the Information Security and Auditing Class. Information technology (IT) has inspired the reengineering of traditional business operations. As global networks expand the interconnection of the world, the smooth operation of communication and computing systems becomes vital. The immediate need for organizations to protect critical information continues to increase. IT advances have introduced new risks that require unique internal controls and also have had great influences on auditing.
IS Auditing examines information systems in order to provide valuable information about the operations and security of information and information systems. This course will additionally give the learner essential information in order to conduct information systems audits. It exposes the learner to the different IT governance, acquisition reporting and compliance.
In this class, we shall have a look at both Information Security and Information Systems Auditing. We hope to interest some of our learner to take this area as their career path. The class will be facilitated by Dr. Samali V. Mlay, Mr. Samuel Ssendi and Ms. Stella Kyalimpa. Enjoy the class.
-
Please receive the course outline that will guide this class.
-
Opened: Friday, 27 September 2024, 12:00 AMDue: Sunday, 27 October 2024, 12:00 AM
-
191.0 KB · Uploaded 25/11/24, 08:18
-
-
-
Please find the updated slides for Topic 1
-
-
-
In this part of topic 2, we shall cover;
1. Information security Threats
- Types
- Mitigation strategies
2. Information Security Risks
- Types
- Mitigation strategies
-
This part of topic 2 will introduce us to an overview of cyber crime. It will cover;
- Cyber security terminologies
- Types of cyber attackers
- Cyber security increasing threat landscape
- Cyber terrorism Vs. Cyber warfare
- Critical IT and National Critical Infrastructure
- Case studies
-
This last part of Topic 3 will enable us dig into the various categories of cybercrime. Specifically we shall delve into the following;
You are encouraged to search for more in order to protect yourself against cybercrime.- Cybercrimes targeting Computer systems
- Cybercrimes targeting Mobiles
- Online scams and frauds
- Social Media Scams and Frauds
- Social Engineering attacks
- Case studies
-
This video will give you a glimpse into Kevin David Mitnick's life journey as an Expert Hacker who later became a Security Expert. He is renown as the Greatest Hacker in the World.
-
For learning purposes, share here the various forms of cybercrime that you or someone you know have experienced. Additionally, share the lessons learnt from the cyber crime and advise on how to protect ourselves against them.
-
-
-
Topic overview.
Information security policy, policy definition and information security lifecycle.
Types of Information security policies
A structure and framework of compressive security
Policy, policy infrastructure, policy design lifecycle and design processes, PDCA model,
Security policy standards and practices-ISO27001, NIST Frameworks.
-
-
-
Overview.
User/accepted usage/access, data access, physical access
Outsourcing, software development and acquisition, hardware acquisition
Network and telecom security.
-
-
5.1 IT Governance
i. i. Principles of IT governance
ii. ii. Assessing the effectiveness of IT governance frameworks
iii. iii. IT Governance Auditing
5.2 IT Management and Operations
i. i. Evaluating IT policies, procedures, and controls
ii. ii. Change management and configuration control
iii. iii. IT Management and Operations Auditing
-
-
-
Opened: Saturday, 26 October 2024, 8:00 AMClosed: Saturday, 26 October 2024, 9:12 AM
MAKERERE UNIVERSITY BUSINESS SCHOOL
COURSEWORK TWO EXAMINATION FOR THE DEGREE OF
BACHELOR OF BUSINESS COMPUTING
OF MAKERERE UNIVERSITY, ACADEMIC YEAR 2024/2025
COURSE NAME: INFORMATION SECURITY AND AUDITING
YEAR OF STUDY: Three
SEMESTER: One
COURSE CODE: BUC3126
DATE: October 26, 2024
TIME: 8.00am – 9.00am
INSTRUCTIONS:
1. The Examination is comprised of 50 Random questions; Choose the most correct response.
2. All questions are COMPULSORY and therefore MUST be attempted by all students directly on the MUBSEP platform
3. The exam duration is 1 hour.
We wish you success
-