Information Assurance Programs

The minor in information assurance (IA) is designed to provide students with the knowledge and capacity to implement information security and to solve information assurance problems. The program goals are to heighten awareness of information assurance in the academic community, prepare graduates who are capable of evaluating information assurance situations, and contribute to finding appropriate solutions to information assurance problems.

For students who currently hold degrees in areas other than information assurance, the program provides the environment to develop their knowledge and capacity for implementing information security and to do research in the area. It will also benefit students who wish to supplement their educations with knowledge of how to evaluate and improve the security of data from both technical and social perspectives.

Minor in Information Assurance

The IA minor is not limited to students in the Donaghey College of Science, Technology, Engineering, and Mathematics. In addition to students in computer-related programs such as Computer Science, Information Science, or Systems Engineering, the minor is also designed to include those with interests in Criminal Justice or Business Management who may not have extensive backgrounds in computers, math, or technology.

Application and Admission Requirements

Application materials, along with a description of the IA minor, may be obtained from the Department of Computer Science, EIT Building, Room 579, phone 501-916-3130. To ensure consideration of applications, check with the IA minor office for application deadlines.

To apply for this program, students must complete or have completed the following:

  • RHET 1312 Composition II, or equivalent
  • MATH 1302 College Algebra, MATH 1315 College Math, or equivalent
  • Submission of a formal application.

Minor in Information Assurance

The Minor in Information Assurance consists of 20 hours in seven courses. All courses must be completed with a grade of “C” or greater. Students matriculating through colleges other than the Donaghey College of Science, Technology, Engineering, and Mathematics will be approved for network and database courses in Business Management unless written consent from instructors in DCSTEM courses is given.


Required Prerequisite (3 hours)

  • IFAS 2300 Introduction to Information Assurance

Core Courses (8 hours)

  • CRJU 3309 Cyber Crime and the Law
  • IFAS 3300 Computer Forensics
  • CPSC/IFSC 2200 Ethics in the Profession

Computer Networking Course (3 hours)

  • BINS 4310 Local Area Networks
  • IFSC 3315 Applied Networking
  • CPSC 4384 Computer Networks or CPSC 3370 Net-centric Computing: Systems Concepts1
  • SYEN 3332 Communication Networks

Database Course (3 hours)

  • BINS 4350 Business Database Management Systems
  • IFSC 3320 Database Concepts
  • CPSC 3375 Database Concepts I
  • SYEN 3360 Data Communications

Approved Elective (3 hours)

  • SYEN 3318 Decision and Risk Analysis
  • BINS 4311 Security Issues and Advanced Topics in Network Technologies
  • IFSC 4339 Network Security
  • IFSC 4330 Database Security
  • CPSC 3380 Operating Systems or CPSC 3370 Net-centric Computing: Systems Concepts1
  • CPSC 4376 Applied Cryptography

1CPSC 3370 can be taken in place of CPSC 4384 or CPSC 3380 but not both.

Courses in Information Assurance (IFAS)

IFAS 2300 Introduction to Information Assurance

Prerequisite: RHET 1312. Study of information security for roles as security professionals and business decision-makers. This course addresses knowledge areas of the Certified Information Systems Security Professional (CISSP) certification, including need for security, legal and ethical issues, risk management, security technologies and tools, and personnel security maintenance. Three hours lecture. Three credit hours.

IFAS 3300 Computer Forensics

Prerequisite: IFAS 2300 and knowledge of Unix or Linux, as well as Windows operating systems. Study of the preservation, identification extraction, documentation, and interpretation of computer data following clear, well-defined methodologies and procedures. This course can be repeated for credit with a different theme. Three hours lecture. Three credit hours.