Master of Science in Information Assurance

Last updated

A Master of Science in Information Assurance (abbreviated MSIA) is a type of postgraduate academic master's degree awarded by universities in many countries. This degree is typically studied for in information assurance.

Contents

Curriculum Structure

The Master of Science in Information Assurance is a one to three years Master Degree; depending on the program, some may even start with two-year preparation classes and covers various areas of computer science, Internet security, Computer security, and or cyber security.

Topics of study may include:

Institutions with MSIA Degree Programs

Institutions in the United States that have a Master of Science in Information Assurance degree program include:

See also

Related Research Articles

<span class="mw-page-title-main">SANS Institute</span> American security company

The SANS Institute is a private U.S. for-profit company founded in 1989 that specializes in information security, cybersecurity training, and selling certificates. Topics available for training include cyber and network defenses, penetration testing, incident response, digital forensics, and auditing. The information security courses are developed through a consensus process involving administrators, security managers, and information security professionals. The courses cover security fundamentals and technical aspects of information security. The institute has been recognized for its training programs and certification programs. Per 2021, SANS is the world’s largest cybersecurity research and training organization. SANS is an acronym for SysAdmin, Audit, Network, and Security.

Capitol Technology University is a private university in South Laurel, Maryland, near Washington, DC. The university was founded in 1927 as the Capitol Radio Engineering Institute by a former US Navy Radioman. CREI changed its name to Capitol Institute of Technology in 1964, changed its name again to Capitol College in 1987, and Capitol Technology University in 2014. Capitol offers undergraduate and graduate programs specializing in engineering, computer science, information technology, and business. It is classified among "D/PU: Doctoral/Professional Universities" and is a National Center of Academic Excellence in Information Assurance Education.

<span class="mw-page-title-main">Golisano College of Computing and Information Sciences</span> Computing school at Rochester Institute of Technology

The B. Thomas Golisano College of Computing and Information Sciences is one of the largest colleges at the Rochester Institute of Technology (RIT), and is home to the institute's computing education and research facilities. Golisano College is home to RIT's computer science, cybersecurity, information sciences and technologies, and software engineering departments, as well as the Ph.D. program in computing and information sciences, and the School of Interactive Games & Media, home to the college's game design and development and interactive development programs. Golisano College is housed in a 125,000 square foot facility, opened in 2003 on RIT's campus in Rochester, New York.

The University of California, Berkeley School of Information is a graduate school at the University of California, Berkeley, a public university in Berkeley, California. The school was established in 1994 as the School of Information Management and Systems (SIMS) and was renamed to its current name in 2006.

Information security standards are techniques generally outlined in published materials that attempt to protect a user's or organization's cyber environment. This environment includes users themselves, networks, devices, all software, processes, information in storage or transit, applications, services, and systems that can be connected directly or indirectly to networks.

Master of Professional Studies (MPS) is a type of master's degree concentrated in an applied field of study. MPS degrees are often interdisciplinary. While Master of Arts and Master of Science degree programs tend to focus on theory and research, Master of Professional Studies degrees tend to emphasize practical skills designed for current and aspiring professionals, including post-bachelor and post-graduate students, and often require some amount of fieldwork or internship to complement classroom learning.

A chief information security officer (CISO) is a senior-level executive within an organization responsible for establishing and maintaining the enterprise vision, strategy, and program to ensure information assets and technologies are adequately protected. The CISO directs staff in identifying, developing, implementing, and maintaining processes across the enterprise to reduce information and information technology (IT) risks. They respond to incidents, establish appropriate standards and controls, manage security technologies, and direct the establishment and implementation of policies and procedures. The CISO is also usually responsible for information-related compliance. The CISO is also responsible for protecting proprietary information and assets of the company, including the data of clients and consumers. CISO works with other executives to make sure the company is growing in a responsible and ethical manner.

The School of Engineering and Applied Science (SEAS) at the George Washington University in Washington, D.C. is a technical school which specializes in engineering, technology, communications, and transportation. The school is located on the main campus of the George Washington University and offers both undergraduate and graduate programs.

The Anderson School of Management (Anderson) is the business school of the University of New Mexico (UNM). Anderson was the first professional school of management established in the state of New Mexico. Anderson's current alumni base is over 24,000 graduates.

Information assurance (IA) is the practice of assuring information and managing risks related to the use, processing, storage, and transmission of information. Information assurance includes protection of the integrity, availability, authenticity, non-repudiation and confidentiality of user data. IA encompasses both digital protections and physical techniques. These methods apply to data in transit, both physical and electronic forms, as well as data at rest. IA is best thought of as a superset of information security, and as the business outcome of information risk management.

The College of Engineering and Computing, commonly known as CEC, formerly the Graduate School of Computer and Information Sciences, at Nova Southeastern University provides educational programs to prepare students for leadership roles in technology. The college is located on the main campus in Fort Lauderdale, Florida within the Carl DeSantis building. In addition to its regional accreditation by the Commission on Colleges of the Southern Association of Colleges and Schools, NSU has been designated a National Center of Academic Excellence in Information Assurance Education by the U.S. National Security Agency and the United States Department of Homeland Security.

The College of Information Sciences and Technology, also known as the College of IST at Pennsylvania State University was established in 1999. Headquartered at the University Park campus in University Park, Pennsylvania, the college's programs are offered at 21 Penn State campus locations. Dr. Andrea Tapia currently serves as the college's interim dean.

<span class="mw-page-title-main">Karen S. Evans</span>

Karen S. Evans is a former United States Senate confirmed, Presidential Appointed executive, who served as the first Assistant Secretary for Cybersecurity, Energy Security and Emergency Response at the U.S. Department of Energy. An executive who served in three Presidential Appointed positions in two Administrations.

<span class="mw-page-title-main">Volgenau School of Engineering</span> Constituent college of George Mason University

The Volgenau School of Engineering is part of the George Mason University College of Engineering and Computing. Based in the Fairfax campus of George Mason University in the Commonwealth of Virginia, the Volgenau School offers programs at the B.S., M.S., and Ph.D. levels.

<span class="mw-page-title-main">Khoury College of Computer Sciences</span> Computer science department of an American university

The Khoury College of Computer Sciences is the computer science school of Northeastern University in Boston, Massachusetts. It was the first college in the United States dedicated to the field of computer science when it was founded in 1982. In addition to computer science, it specializes in data science and cybersecurity. The college was also among the first to offer an information assurance degree program.

<span class="mw-page-title-main">Internet Security Awareness Training</span>

Internet Security Awareness Training (ISAT) is the training given to members of an organization regarding the protection of various information assets of that organization. ISAT is a subset of general security awareness training (SAT).

<span class="mw-page-title-main">DHS Cyber Security Division</span>

The Cyber Security Division (CSD) is a division of the Science and Technology Directorate (S&T Directorate) of the United States Department of Homeland Security (DHS). Within the Homeland Security Advanced Research Projects Agency, CSD develops technologies to enhance the security and resilience of the United States' critical information infrastructure from acts of terrorism. S&T supports DHS component operational and critical infrastructure protections, including the finance, energy, and public utility sectors, as well as the first responder community.

A Master of Science in Cyber Security is a type of postgraduate academic master's degree awarded by universities in many countries. This degree is typically studied for in cyber security. What is offered by many institutions is actually called a Master in Strategic Cyber Operations and Information Management (SCOIM) which is commonly understood to be a Master in Cybersecurity. This degree is offered by at least some universities in their Professional Studies program so that it can be accomplished while students are employed - in other words it allows for "distance learning" or online attendance. Requirements for the Professional Studies program include: 3.0 or better undergrad GPA, professional recommendations letters and an essay.

Cyber Security and Information Systems Information Analysis Center (CSIAC) is a United States Department of Defense (DoD) Information Analysis Center (IAC) sponsored by the Defense Technical Information Center (DTIC). The CSIAC is a consolidation of three predecessor IACs: the Data & Analysis Center for Software (DACS), the Information Assurance Technology IAC (IATAC) and the Modeling & Simulation IAC (MSIAC), with the addition of the Knowledge Management and Information Sharing technical area.

William "Chuck" Easttom II is an American computer scientist specializing in cyber security, cryptography, quantum computing, and systems engineering.

References

  1. "Master of Science in Cyber and Information Security - Online - Capitol Technology University". www.captechu.edu.
  2. "MSIA - Master of Science in Information Assurance - Dakota State University". Archived from the original on 2014-07-13. Retrieved 2014-07-30.
  3. "Masters in Information Assurance". Florida Institute of Technology. Archived from the original on 2014-01-12. Retrieved 2013-07-10.
  4. "MS in Information Security Online | School of Computer Science". Archived from the original on 2013-06-23. Retrieved 2013-07-10.
  5. "Master of Science in Information Assurance".
  6. "Cybersecurity". 16 August 2013.
  7. "Master of Science in Cybersecurity - CCIS". www.ccs.neu.edu.
  8. "Information Security & Assurance".
  9. "M.S. in Information Assurance (MSIA) - Oklahoma State University". watson.okstate.edu. 25 June 2020.
  10. http://informationassurance.regis.edu/ia-programs/ms-ia
  11. "Robert Morris University". www.rmu.edu.
  12. "Information Assurance (M.S.) | St. Cloud State University".
  13. "MSIAS". www.ece.uah.edu.
  14. "Cybersecurity Master's Online Degree Program in IT - WGU" (PDF).