CSCI 4624


None
Course Number:
CSCI 4624

Approved Starting Semester:
Fall 2021

Course Title:
Risk Management

Credit Hours:
3

Course Description (Bulletin Description):
This course addresses the broad topic of risk management and how risk, threats, and vulnerabilities impact information systems. Areas of instruction include how to assess and manage risk based on defining an acceptable level of risk for information systems. Elements of a business impact analysis, business continuity plan, and disaster recovery plan will also be discussed.

Prerequisite:
CSCI 4200

Co-requisite:
None

Pre/Co-requisite::
None

Dual-Listed:
CSCI 5624

Course Objectives (Course-level Student Learning Outcomes):
At the completion of the course, the student will be able to: 1. Explain the basic concepts of and need for risk management. 2. Explain methods of mitigating risk by managing threats vulnerabilities, and exploits. 3. Identify compliancy laws, standards, best practices, and policies of risk management. 4. Describe the components of an effective organizational risk management program. 5. Describe techniques for identifying and analyzing relevant threats, vulnerabilities, and exploits. 6. Describe the process of performing risk assessments. 7. Identify assets and activities to protect within an organization. 8. Identify threats, vulnerabilities, and exploits. 9. Identify risk mitigation security controls. 10. Describe concepts for planning risk mitigation throughout an organization. 11. Describe concepts for implementing a risk mitigation plan. 12. Perform a business impact analysis. 13. Create a business continuity plan (BCP) based on the findings of a given risk assessment for an organization. 14. Create a disaster recovery plan (DRP) based on the findings of a given risk assessment for an organization. 15. Create a computer incident response team (CIRT) plan for an organization.

Topics Covered (In Outline/Calendar):
• assessment of systems • resources that are vulnerable to intrusions and unauthorized access from a management/strategic perspective • analysis of system vulnerability • identification of security deficiencies • security measurement • effectiveness and adequacy • estimation of vulnerability of system resources to potential disaster hazards

Student Learning Outcomes:
  • Analyze a complex computing problem and to apply principles of computing and other relevant disciplines to identify solutions. (SLO1)
  • Support the delivery, use, and management of information systems within an information systems environment. (SLO6-CIS)
Course Coordinator:
Dr. Mir Hasan

Instructor-in-charge:
Dr. Mir Hasan

Previous Professors:
Dr. Mir Hasan

Technologies / Skills:
Assessment of system vulnerability

Textbook(s):
Summer/Spring 2026
Title: MANAGING RISK IN INFORMATION SYSTEMS
Edition: 2ND
Author: GIBSON
Publisher: JONES+BART
ISBN: 9781284055955
========================================


Go back to choose another course