The page uses Browser Access Keys to help with keyboard navigation. Click to learn moreSkip to Navigation

Different browsers use different keystrokes to activate accesskey shortcuts. Please reference the following list to use access keys on your system.

Alt and the accesskey, for Internet Explorer on Windows
Shift and Alt and the accesskey, for Firefox on Windows
Shift and Esc and the accesskey, for Windows or Mac
Ctrl and the accesskey, for the following browsers on a Mac: Internet Explorer 5.2, Safari 1.2, Firefox, Mozilla, Netscape 6+.

We use the following access keys on our gateway

n Skip to Navigation
k Accesskeys description
h Help
George Mason University
    George Mason University
   
 
 
 
2016-2017 University Catalog 
  
2016-2017 University Catalog

IT 462 - Information Security Principles

Credits: 3
Limited to 2 Attempts
Offered by Information Sciences and Technology  
Studies security policies, models, and mechanisms for secrecy, integrity, availability, and usage controls. Topics include models and mechanisms for mandatory, discretionary, and role-based access controls; authentication technologies; control and prevention of viruses and other rogue programs; common system vulnerabilities and countermeasures; privacy and security policies and risk analysis; intellectual property protection; and legal and social issues.

Prerequisite(s): (IT 105 or IT 212), and grade of “B” or better in IT 223.
Prerequisite(s) enforced by registration system.

Notes: For INFT and AIT majors, minors and certificates, and BAS cybersecurity concentration only.

Schedule Type: LEC
Hours of Lecture or Seminar per week: 3
Hours of Lab or Studio per week: 0