Program Codes:
BSCYBSC
Bachelor of Science
Introduction
The department offers BS in Cyber security and BS in Data Science. The goal of the Computing & Information Science Department at Mercyhurst University is to be a center of excellence in cyber security and data science education that is recognized by employers and graduate schools across the country and the world.
Mission Statement
The Department of Computing & Information Science is committed to:
Majors and Minors
Majors: Cyber security and data science
Minors: Computer science, cyber security, and data science
This course introduces to fundamental concepts in computer science. Topics include: problem solving, algorithm development, computer programming in a high level language, debugging programs, abstract data types, variables, assignment, loops, conditionals, functions. Students who have successfully completed MATH 146 should not take this course.
This course introduces students to concepts in cyber security including: fundamentals of secure policy design: least privilege, fail-safe defaults, separation, minimize trust, economy of mechanism, minimize common mechanism, least astonishment, open design, layering, abstraction, modularity, linkage, interaction, social engineering attacks, cybersecurity user education, sensitive personal data, indentifying and documenting security requirements for software and systems.
This course introduces to linear and non-linear data structures and algorithm analysis. Topics include: arrays, linked lists, stacks, queues, trees (search, balanced), heaps, hash tables, graphs, numpy arrays, dataframes, asymptotic analysis including big-Oh notation, and techniques for measuring algorithm complexity. Students who have successfuly completed MIS 190 should not take this course.
This is the second course in the data structures sequence that introduces students to non-linear data structures: trees (binary, balanced, and n-ary) and graphs and how to use them to design efficient algorithms to solve fundamental computing problems such as sorting data and searching for information.
This course introduces to principles of digital logic and computer organization. Topics include: binary number system; hexadecimal notation; logic gates; Boolean algebra; processor, memory and I/O organization; instruction set architecture; performance optimization; hardware security and supply chain risks. Students who have successfully completed MIS 140 should not register for this course.
Study of computer system administration using standalone and networked UNIX/Linux systems. Topics Include system design and installation, file systems, BASH shell, user and process management, backup/restore, common administrative tasks, troubleshooting, and networking service administration. This course includes a lab intensive component. Students who have successfully completed MIS 180 should not register for this course.
An introduction to networks, protocols, and distributed systems. Topics include: OSI model, TCP/IP, LAN and WAN, layer 2 and layer 3 architecture, resource management, naming, addressing and routing, reliable communication, security, and higher-level services. Students who have successfully completed MIS 260 should not register for this course.
This course will introduce students to the concept of securing data in transfer or during storage. This includes a discussion on information security objectives: data integrity, authentication, and data privacy: classical ciphers and block ciphers: cryptography (secret key cryptography, public key cryptography), cryptographic algorithms used; message digests; password-based, address based, and cryptographic authentication; and end to end security.
This course introduces students to the principles and practice of digital forensics. Topics include: computer crime, intellectual property, privacy issues, legal codes; risks, vulnerabilities, and countermeasures; methods and standards for extraction, preservation, and deposition of legal evidence in a court of law.
This course will introduce students to the concept of the design of secure computing systems. This includes networks security and protocols, intrusion detection and prevention systems, access control, firewalls, email security, web security, hardware security and trust, and IOT and control systems security.
With increasing importance of computer networks, network security has become a critical topic of concern for the field of cybersecurity. This course begins with a review of information security, networking and cryptography concepts followed by the practical techniques to manage implementation of network security solutions for any organization. Students will learn how to design and implement cybersecurity mechanisms for an organization's network.
This course introduces students to legal aspects of cyber security. Topics include: availability, integrity, confidentiality, risk analysis and incident response, intellectual property law, contracts in online transactions, tort law issues in cyberspace, the concept of privacy and its legal protections and the governance of information within organizations.
This course introduces students to the issue of ethics in the profession of computing. These include: electronic privacy, security, information ethics, existing and emerging cyber law, environments of trust, risk management and operation feasibility issues.
This senior capstone course provides students with a focused, team-based design experience. Students will work with other students, industry mentors, and a faculty advisor to apply computing and information scence methods in solving a real-world problem.
It is further recommended that the Cybersecurity majors obtain a minor or (preferably) a major in an additional discipline. All Cybersecurity majors must maintain a CIS GPA of 2.0 or higher. A student who does not satisfy this requirement may be dismissed from the major and/or prohibited from graduating with the major. A student who receives a C or below in CIS 210: Non-linear Data Structures must have the department’s permission to continue in the major.
Computer Science Minor (5 courses):
Required: CIS 100, CIS 200, CIS 210
Choose at least two other CIS courses (except CIS 201).
Data Science Minor (5 courses):
Required: CIS 100, CIS 150, CIS 200, STAT 139 or CIS 201
Choose at least one of: CIS 210, CIS 280, or CIS 350
Cybersecurity Minor (5 courses):
Required: CIS 100, CIS 160, CIS 261, CIS 360, CIS 361