The page uses Browser Access Keys to help with keyboard navigation. Click to learn moreSkip to Navigation

Different browsers use different keystrokes to activate accesskey shortcuts. Please reference the following list to use access keys on your system.

Alt and the accesskey, for Internet Explorer on Windows
Shift and Alt and the accesskey, for Firefox on Windows
Shift and Esc and the accesskey, for Windows or Mac
Ctrl and the accesskey, for the following browsers on a Mac: Internet Explorer 5.2, Safari 1.2, Firefox, Mozilla, Netscape 6+.

We use the following access keys on our gateway

n Skip to Navigation
k Accesskeys description
h Help
George Mason University
    George Mason University
   
 
 
 
2016-2017 University Catalog 
  
2016-2017 University Catalog

IT 353 - Information Defense Technologies

Credits: 3
Limited to 2 Attempts
Offered by Information Sciences and Technology  
This course will examine and assess the role of information technology as a tool of warfare and civil defense. Topics will be discussed from both defensive and offensive perspectives and will include asset tracking, asymmetric warfare, network centric warfare, physical attacks, cyberterrorism, espionage, psyops, reconnaissance and surveillance, space assets, and applications of GPS and cryptographic technology. Students will research and write about the social, ethical, and political effects of such technology.

Prerequisite(s): (IT 101 or IT 105), and grade of “B” or better in IT 223
Prerequisite(s) enforced by registration system.

Notes: For INFT and AIT majors, minors and certificates, and BAS cybersecurity concentration only.

Schedule Type: LEC
Hours of Lecture or Seminar per week: 3
Hours of Lab or Studio per week: 0