Mar 19, 2024  
2014-2015 Undergraduate Catalog 
    
2014-2015 Undergraduate Catalog [ARCHIVED CATALOG - Consult with Your Academic Advisor for Your Catalog Year]

Cybersecurity and Information Assurance (B.S.)


Return to {$returnto_text} Return to: Programs of Study

(Bachelor of Science Degree)

The assurance of information during transmission or while in storage and the security of critical information infrastructures are a major responsibility of government and the private sector. Securing computers and computer networks, and conducting investigations of cybercrimes and forensic analysis of digital devices are principal methods of securing cyberspace. Through a multidisciplinary approach integrating criminology, criminal justice, economic crime, and computer science, students will be prepared for entry level positions either in cybercrime investigation and computer forensics or the security of information stored in or transmitted by computers and computer networks.

Utica College offers an on-ground undergraduate program in Cybersecurity; there is also an undergraduate online program for transfer students who have already earned an associate’s degree. There is an online master’s program in Cybersecurity. For more information on the master’s program, consult the UC graduate catalog.

Total credit hours required for degree: 120

Learning Objectives

A student who completes the undergraduate major in Cybersecurity will demonstrate the following either orally or in writing:

  • knowledge of the technologies and methods to protect the confidentiality (“disclosure threat”), integrity (“authentication threat”) and availability (“denial of service threat”) of information and the computers, systems and networks that create, process, store and communicate valued information;
  • using case study method, the Ryan-Nichols Risk Management Equation and OCTAVE assessment methods; explore the nature and relationships qualitatively and quantitatively of risk, threats, impact, vulnerabilities and countermeasures applied to cybersecurity, computer forensics and information assurance;
  • using case study method, apply problem solving techniques and Attack / Defense (A/D) scenarios to defend / respond to the critical cyber / information infrastructure threats;
  • knowledge of contemporary organization, principles, and best practices that govern cybersecurity activities at the federal, state, and local level and in the private sector;
  • plans for deployment of national assets into critical infrastructure sectors (CIS) and their protection against terrorist cyber threats - especially SCADA systems;
  • development of relevant theoretical knowledge, employment of strategic and tactical skills, and demonstration of cooperative leadership in solving problems of cybersecurity, computer forensics, identity fraud, child pornography, cyber terrorism, cyber-stalking, computer crimes, etc.;
  • synthesis of a broad-based knowledge of information assurance / security issues with government policies, procedures, laws and strategies;
  • effective and innovative strategies for rapid, creative responses to cybersecurity threats on our nations’ and corporate computer systems, by using research skills, knowledge of Federal and state policies, procedures, best practices and creative teamwork to respond to simulated cyber emergencies;
  • preparation of “on-target” executive PowerPoint situation reports that focus on key cybersecurity issues and joint dependencies and vulnerabilities, and recommend required short- and long-term actions;
  • using case study method, explore the nexus between cybersecurity, economic crime, identity fraud, drug trafficking, and combating terrorism;
  • using case study method, discuss how ethical issues impact organizational and individual decision making in the cybersecurity field;
  • understanding of information assurance, security policy; secure acquisitions, research and development; systems operations, vulnerability analysis, secure systems testing, triage and incident response, technology, procedures, insurance, training, and certification;

For forensics professionals, students will additionally demonstrate:

  • knowledge of how to set up an investigator’s office and laboratory, and understanding of what computer forensic hardware and software tools are required;
  • understanding of the importance of digital evidence controls and how to process crime and incident scenes;
  • details of data acquisition, computer forensic analysis, e-mail investigations, image file recovery, cell phone forensics, investigative report writing, and expert witness requirements;
  • effective performance of a range of laboratory and hands-on assignments about theory and practical application of computer forensic investigation;
  • construction of a solid Computer Forensics Evidence Plan (CFEP), a fundamental component of preparing a legal case based on seized digital evidence.

Special Requirements

Students in Cybersecurity and Information Assurance are required to achieve a cumulative grade point average of at least 2.5 (on a 4.0 scale) across major, major-related, major elective, and major concentration courses by the first semester of their junior year and to maintain that average thereafter.

Academic Requirements


Core: 34-55 Credit Hours


18 - 27 Credit Hours


Note:


*Only available to online students enrolled in the major or students with appropriate professional criminal justice work experience, with permission from the director of the program.

Note:


** Required only of Information Assurance students.

***Required only of Cybercrime Investigation and Forensics students.

Major Concentration


Each student must select one of the following concentrations:

Return to {$returnto_text} Return to: Programs of Study