School of Information Technology
School of Information Technology

Information Systems Security

What It Means

"Night and day difference from where I was to where I am, thanks to the education."
- Nick Collins, 2007

Ready to make a change in your life, but not sure where to begin?

We Can Help

Consumers, businesses and government rely on the Internet and web services for information and communications. Managing the transfer of data and access to it requires reliability, privacy and security in cyberspace. In our digital world, an attack on one computer may affect multiple systems. Unauthorized access may result in financial loss, the release of confidential information, damages to computer systems, costly staff time to restore operations and diminished reputation.

Organizations use systems security professionals to design, configure, implement, manage, support and secure reliable computer systems. The responsibilities of professionals in this field have increased in recent years as cyber attacks have become more sophisticated.1 Employees with skills and knowledge in systems security have become part of many information technology infrastructure teams

What It Means to You

With the growing use of electronic data comes a growing need for privacy and security in cyberspace. The damage caused by unauthorized access can be considerable and include: loss of funds due to fraud, loss of confidential information, damage to computer systems, staff time and expense to restore operations, embarrassing changes to websites by cyber vandalism and diminished reputation.

Businesses and governments use systems security professionals who can help design, configure, implement, manage, support and secure computer systems. Employees with knowledge of information systems security are now considered to be an important part of many information technology infrastructure teams.

1 Bureau of Labor Statistics Occupational Outlook Handbook, 2010-2011 edition.

 
  Enter your first name

Meet a Graduate

Jeff Light
Information Systems Security
Bachelor of Science

Graduated 2010
Tulsa, OK

Meet Jeff


Program of Study Information Federal Disclosure

Financial Assistance Information
This program is available at the
following campuses.

The Information Systems Security Program has been Certified by CNSS
ISS program is approved by the CNSS

Click here to learn more.

Good For Someone Who

  • Enjoys a high sense of responsibility
  • Likes to work independently
  • Is analytical and detail oriented

Type Of Work Environment

  • Office (onsite & offsite)
  • Consulting
  • MIS/IT Dept

Type of Technology Mostly
Used In This Area


  • Servers
  • Computers/Internet
  • Firewall hardware/software
       (sniffers/virus detection)

Typical Starting Positions

  • Information security technician
  • Network security specialist
  • ISP security technician
Page ID