Handbook home
Cyber Security Management (ISYS90090)
Graduate courseworkPoints: 12.5Not available in 2019
Overview
Fees | Look up fees |
---|
AIMS
This subject introduces a range of information security management services implemented in industry. The subject will cover the fundamental principles and practice of security risk assessment, incident response and disaster recovery, knowledge leakage, systems and network security, and policy and culture. Students will develop an appreciation for the kinds of security practices that exist in industry in each of these areas.
This subject supports course-level objectives by allowing students to have in-depth knowledge of the specialist area of information security management. The subject’s assessment tasks include the writing of a comprehensive consulting proposal and research into critical security issues faced by organizations. These tasks will encourage students to work in a team to develop a high-level of achievement in writing, research activities, and presentation skills.
INDICATIVE CONTENT
Security principles and techniques discussed are: Models for understanding knowledge leakage, Security Risk Assessment Methods, Firewall and virtual private network (VPN) security scenarios, and Incident Response Methodology. Real world cases will be drawn from a range of organization types including critical infrastructure installations in Australia.
Intended learning outcomes
INTENDED LEARNING OUTCOMES (ILOs)
On completion of this subject the student is expected to:
Independently research and argue disparate beliefs/theories of information systems security
- Have developed a sound knowledge and understanding of the practice of Business Information Systems Security in Organisations
- Have developed and applied skills in critical thinking and systems analysis to identify, evaluate and/or communicate strategic and operational issues suited to the application of Information Systems Security concepts and theories to real-world practice
- Have developed and applied skills related to business communication suited to the application of Information Systems Security concepts and theories to real-world practice
- Can demonstrate an understanding of professional codes of conduct and ethical standards as they apply to Information Systems Security in practice
Generic skills
On completion of this subject, students should have developed the following generic skills:
- Have in-depth knowledge of a specialist area through exposure and study of information security areas of knowledge
- Reach a high level of achievement in writing, research or project activities problem-solving and communication through the writing of a comprehensive consulting proposal
- Report-writing skills
- Presentation skills
Last updated: 3 November 2022
Eligibility and requirements
Prerequisites
This subject is only available to students admitted to the Master of Information Systems (Executive), or students with permission of the Master of Information Systems (Executive) Course coordinator
Corequisites
None
Non-allowed subjects
None
Inherent requirements (core participation requirements)
The University of Melbourne is committed to providing students with reasonable adjustments to assessment and participation under the Disability Standards for Education (2005), and the Assessment and Results Policy (MPF1326). Students are expected to meet the core participation requirements for their course. These can be viewed under Entry and Participation Requirements for the course outlines in the Handbook.
Further details on how to seek academic adjustments can be found on the Student Equity and Disability Support website: http://services.unimelb.edu.au/student-equity/home
Last updated: 3 November 2022
Assessment
Additional details
- One individual seminar paper of approximately 1500 words, requiring 25-30 hours of work per student, due in week 5 (30%). Addressing Intended Learning Outcomes (ILOs) 1,2,3 and 5 in the seminar paper.
- One individual response to a seminar paper of approximately 500 words requiring 13-15 hours of work per student, due in week 7 (10%), addressing ILOs 1 and 2 in the response to the seminar paper.
- 500 word reflection on nominated contributions to discussion boards made by the student requiring 13-15 hours of work, across the teaching period (10%), addressing ILOs 1,2 and 3 in class discussions.
- One individual written assignment (consulting proposal) of approximately 2,500 words, requiring 70-75 hours of work, due in week 9. (50%) ILOs 1 to 5 are addressed in the consulting proposal.
Last updated: 3 November 2022
Dates & times
Not available in 2019
Time commitment details
200 hours
Last updated: 3 November 2022
Further information
- Texts
Prescribed texts
Whitman, M. E., & Mattord, H. J. (2014). Principles of information security. Cengage Learning. 5th Edition.
- Related Handbook entries
This subject contributes to the following:
Type Name Course Master of Information Systems (Executive) - Available through the Community Access Program
About the Community Access Program (CAP)
This subject is available through the Community Access Program (also called Single Subject Studies) which allows you to enrol in single subjects offered by the University of Melbourne, without the commitment required to complete a whole degree.
Entry requirements including prerequisites may apply. Please refer to the CAP applications page for further information.
- Available to Study Abroad and/or Study Exchange Students
This subject is available to students studying at the University from eligible overseas institutions on exchange and study abroad. Students are required to satisfy any listed requirements, such as pre- and co-requisites, for enrolment in the subject.
Last updated: 3 November 2022