Semester 2, 2022 Online | |
Units : | 1 |
Faculty or Section : | Faculty of Business, Education, Law and Arts |
School or Department : | School of Business |
Grading basis : | Graded |
Course fee schedule : | /current-students/administration/fees/fee-schedules |
Staffing
Examiner:
Overview
It is vitally important that managers and IS professionals have a good understanding of Cyber Security from a strategic perspective. This includes planning for security, development of security policy and its implementation in security programs underpinned by security management models and best practice, with appropriate risk management and controls in place. It is also important to have a good appreciation of importance of people, law and ethics in the management of Cyber Security programs in organisations. In order to effectively manage and protect the information assets of organisations students need to develop the knowledge and skills required for security planning, development, implementation and evaluation of security policy and programs.
This course provides students with a good grounding in the key components for developing implementing and evaluating an Cyber Security strategy in an organisation. Students will design develop and implement security policy and programs in organisations. Students will be assessed on their understanding on how to conduct Cyber Security planning and develop security policy and plan for the implementation of security programs, models and practices. The importance of risk management through appropriate use of controls, and the role of people, law and ethics is emphasised in the assessments.
Course learning outcomes
On successful completion of this course, students should be able to:
- identify and solve complex organisational problems creatively and practically through planning for security to increase the effectiveness of management processes through the development implementation and evaluation of a security policy and programs;
- evaluate, synthesise and critically review theoretical frameworks with other evidence to provide solutions to real-world problems by applying security management models and practices to security programs;
- demonstrate an understanding of change on organisations in the global environment and the impact of these on organisational systems by developing risk management strategies that incorporate appropriate controls;
- demonstrate an understanding of the impact of interpersonal communication on specific management processes and outcomes using relevant theories and concepts by understanding the relationships between security and personnel, between security and law, between security and ethics;
- communicate professionally and effectively in written communication to various audiences to achieve targeted outcomes demonstrating and collating concepts of Cyber Security.
Topics
Description | Weighting(%) | |
---|---|---|
1. | Planning security | 25.00 |
2. | Information security policy | 10.00 |
3. | Developing the security program, management models and practices | 20.00 |
4. | Risk management and controls | 30.00 |
5. | Personnel security, law and ethics | 15.00 |
Text and materials required to be purchased or accessed
Student workload expectations
To do well in this subject, students are expected to commit approximately 10 hours per week including class contact hours, independent study, and all assessment tasks. If you are undertaking additional activities, which may include placements and residential schools, the weekly workload hours may vary.
Assessment details
Description | Group Assessment |
Weighting (%) | Course learning outcomes |
---|---|---|---|
Research (paper) 1 | No | 25 | 1,2,4,5 |
Research (paper) 2 | No | 35 | 2,3,4,5 |
Time limited online examinatn | No | 40 | 1,2,3,4,5 |