Cyber Security Management is available as a postgraduate-level subject offered by the International College of Management, Sydney (ICMS). Please click the button below to find a postgraduate course suitable for you.
CYB701A
Specialisation
700
4 credit points
The number of cyber-attacks on companies has risen sharply. A successful cyber-attack has devastating effects on business operations, customer reputation, and legal affairs. The challenge of cyber security management is therefore to establish governance structures, procedural, and technical cyber security measures in such a way that companies are effectively protected from cyber-attacks. However, cyber security measures are associated with significant financial investments and require technical and human resources.
The aim of this subject is for students to engage critically with the challenges and opportunities of modern cyber security management. They will be enabled to evaluate threats in the business context. Furthermore, students will be able to identify, design and finally evaluate threat-adequate governance structures, procedural controls and technical controls in regard to regulatory demands, costs, and business operations.
This subject is divided into five key information security management topics: Fundamentals of Information Security Management, Cyber Security Risk Management, Procedural Security Controls, Technical Security Controls and Evaluation of Security Controls. Students will not only be competent with concepts and techniques but will also be able to critically analyse cyber threats, and evaluate, design and justify cybersecurity measures.
a) Identify and critically analyse cybersecurity threats to the business.
b) Critically evaluate the economic impact of cybersecurity threats on the business.
c) Critically assess cybersecurity governance and risk management measures in response to changing threats within an organisational context.
d) Design and justify procedural and technical cybersecurity controls to mitigate cybersecurity threats under consideration of the IT and business process landscape.
Learning outcomes for this subject are assessed using a range of assessment tasks as described in the table below.
No | Assessment task | Weighting | Subject learning outcomes to be assessed |
1 | Online Quizzes (Invigilated) | 15% | a, b, c, d |
15% | |||
2 | Video Presentation | 30% | a, b |
Case Analysis - Threat Mitigation Strategy | 40% | c, d |
Topic: |
Week 1: Fundamentals of Cyber Security Management I: Cybersecurity Economics
|
Week 2: Fundamentals of Cyber Security Management II: Fundamental Concepts
|
Week 3: Cyber Security Risk Management I: Principals
|
Week 4: Cyber Security Risk Management II: Governance, Standards and Best Practices
|
Week 5: Procedural Security Controls I: Asset Security
|
Week 6: Procedural Security Controls II: Secure Software Development
|
Week 7: Procedural Security Controls III: Security Incident Response
|
Week 8: Technical Security Controls I: Security Engineering
|
Week 9: Technical Security Controls II: Security Assessment and Testing
|
Week 10: Evaluation of Security Controls I: Cost-based Methods
|
Week 11: Evaluation of Security Controls II: Presentation
|
Please note that these topics are often refined and subject to change so for up to date weekly topics and suggested reading resources, please refer to the Moodle subject page.