Given the importance of information security, students will conduct research and write a consolidated, thematic essay on the selected case study or topic:
Describing the historical approaches and techniques hackers use to gain access, privileges, and control of information systems.
Analyzing and identifying potential vulnerabilities, and specific counter measures.
Synthesizing and recognizing security concerns that have potential to turn into catastrophes.
Evaluating the proactive measures as well as the legal, technological, and policy aspects of information security.