This subject is available under ICMS undergraduate degrees, please click the button below to find an undergraduate course for you.
CYB203A
Specialisation
3 credit points
CYB101A Cyber Security Essentials
ICT102A Network Fundamentals
Course level of study pre-requisite: a total of 12 credit points including ICT101A, ICT102A, ICT103A and DAT101A from level 100 core subjects prior to enrolling into level 200 core and specialisation subjects
200
Organisations are migrating their valuable data and mission-critical services to the cloud due to the strategic and operational benefits it offers, such as flexibility, accessibility, efficiency, scalability, and maintainability. Considering their low cost, high performance, all-inclusive, and on-demand nature, cloud platforms are widely adopted by businesses globally in various settings.
The popularity and the widespread use of cloud solutions amongst organisations have significantly increased cloud attacks by cybercriminals, causing considerable losses to businesses and disruption to cloud service providers. Therefore, building an adequate cloud security posture is essential for organisations to safeguard their valuable assets and optimise their cyber resilience.
This subject introduces students to cloud computing fundamentals from a cybersecurity perspective, examining the associated systems, models, and technologies. Students will explore cloud architectures, services, and applications, concentrating on their security essentials to safeguard organisational data confidentiality, integrity, and availability.
Using industry tools, techniques, and best practices, students will apply contemporary security mechanisms to safeguard a cloud environment. Through hands-on activities, they will gain the practical skills necessary to mitigate risks and threats inherent in a cloud ecosystem. Students will also examine the need for risk management, business continuity, and disaster recovery in cloud operations to control service disruption.
a) Describe cloud security technologies and paradigms, including associated architectures, models, services, and applications.
b) Evaluate cloud infrastructures and inherent components and classify security risks, threats, and vulnerabilities for mitigation.
c) Apply security techniques and mechanisms in a cloud environment in line with secure cloud infrastructure characteristics to mitigate cyber security risks and threats.
d) Examine a cloud environment or application and identify appropriate risk management strategies to enhance business continuity and disaster recovery.
e) Explore real-world cloud computing and their impact on data confidentiality, integrity, and availability.
No | Assessment Task | Weighting | Learning Outcomes |
1 | Online Quizzes (Invigilated) | 15% | a, b, e |
15% | |||
2 | Cloud Security Project | 30% | b, c, e |
3 | Cloud Security Case Analysis (G) | 40% | b, c, d, e |
Broad Topics to be Covered:
Topic: |
Week 1: Fundamentals and Applications of Cloud Computing
|
Week 2: Cloud Infrastructure and Virtualisation in Cloud Computing
|
Week 3: Cloud Models, Workloads, Management, and Monitoring
|
Week 4: Cloud Computing and Information Security
Privacy in the cloud |
Week 5: Cloud Infrastructure Security and API Security
|
Week 6: Cloud Vendors and Solutions in Infrastructure Services
|
Week 7: Cloud Vendors and Solutions in Application services
|
Week 8: Cloud Threat Management
|
Week 9: Cloud Monitoring, Auditing and Billing
|
Week 10: Risk Management and Compliance in Cloud
|
Week 11: Disaster Recovery and Business Continuity in Cloud
|