May 23, 2024  
2018 - 2019 Catalog 
2018 - 2019 Catalog [ARCHIVED CATALOG]

Add to Portfolio (opens a new window)

CJ 187W - Current Issues in Security

Credits: 3

Surveys current issues in security: terrorism, espionage, substance abuse, employee theft, computer vulnerabilities, and protection of information.

Prerequisite(s): READING LEVEL 1 or WRITING LEVEL 1
Corequisite(s): None
Lecture Hours: 45 Lab Hours: 0
Meets MTA Requirement: None
Pass/NoCredit: No

Outcomes and Objectives 1.    Examine methods for the protection of information after it has been collected, while it is being maintained by the security entity, and the

       disseminating of this information to appropriate individuals authorized to receive it.   

     A.          Cite rules of the federal Fair Credit Reporting Act, which created specific regulations for private business governing the collection,
                   maintenance, and use of credit information on individuals.

     B.          Provide details of the Code of Fair Information Practice applicable to all automated personal data systems.

     C.          Explain various concepts of the Federal Freedom of Information Act.

     D.          Present information of the Federal Financial Privacy Act, which controls the dissemination of customer information by banks.

2.    Provide customers and employees with methods to cope with problems of computer vulnerability and/or security.    

     A.          Provide suggestions for confidentiality, the status accorded data that require protection from unauthorized disclosure.

     B.          Cite methods for data integrity, a state wherein the data agree with the source document from which they have been derived and wherein
                   they have not been accidentally or maliciously altered, disclosed, or destroyed.

     C.          Explain concepts of data security - protection of data from accidental or intentional but unauthorized modification, destruction or disclosure.

     D.          Indicate methods of risk analysis - analysis of system assets vulnerabilities to establish an expected loss from certain events based on
                   estimated probabilities of the occurrence of these events.

    E.            Provide detailed contingency plans for emergency responses.

3. Examine internal threats and appropriate countermeasures to thwart it.

     A.          Determine problems of employee theft.

                  1.    How serious is the problem?

                  2.    Why do employees steal?

                  3.    How do employee steal?

     B.          Suggest management countermeasures: e.g. accountability, accounting, auditing and policy and procedural controls.

     C.          Provide methods for physical security countermeasures such as: access control, locks and keys, alarms, closed-circuit television and other
                   cameras, patrols, safes, vaults and files.

4.    Be cognizant of substance abuse and associated problems.

     A.          Provide examples of substance abuse; employee who:

                  1.    Abuses prescriptions and counter drugs.

                  2.    Obtains, sells, or uses illegal drugs.

                  3.    Drinks, smokes, and sniffs inappropriate substances in workplace or while off-duty.

                  4.    Steals to support habits.

                  5.    Slows production, makes errors or is consistently absent.

     B.          Examine causes of the substance abuse.

     C.          Cite methods to counter abusive practices within the workplace.

  Outcome 5:    Analyze various methods of espionage utilized by competition as well as foreign entities.    

     A.          Cite necessity of proper screening of applicants.

     B.          Provide methods of testing knowledge as well as psychological.

     C.          Furnish procedure for conducting background investigations.

     D.         Explain polygraph process and its importance.

     E.          Establish safeguards for entrance checks for visitors.

     F.          Provide policy and procedures for non-employee access to site.

     G.         Relate necessity for exit examination of all subjects.

     H.         Cite necessity to constantly upgrade computer and all other security measures.

  Outcome 6:    Examine necessity of providing terrorist protection and/or training to employees of establishment protected by private

     A.          Analyze entity to ascertain if appropriate terrorist target.

     B.          Provide recommendations for protective methodology.

     C.          Recommend training sites for individual needs.

     D.          Illustrate pre-training and post-training importance.

     E.          Cite need for on-going and up-to-date training.

7.    Perform writing tasks to promote learning of concepts.

     A.          Document attainment of skills learned.

     B.          Demonstrate knowledge of the subject.

8.    Write effectively for a specific audience and purpose.

     A.          Articulate important ideas.

     B.          Select, organize, and present details to support a main idea.

     C.          Employ conventions of written, edited, standard English (WESE) or the language of instruction.

     D.          Use appropriate vocabulary for the audience and purpose.

9.    Demonstrate the learning of concepts through writing.

     A.          Analyze course content in written form.

     B.          Explain the subject matter in a coherent writing style.

Add to Portfolio (opens a new window)