Handbook home
Cyber Security Management (ISYS90090)
Graduate courseworkPoints: 12.5Online
For information about the University’s phased return to campus and in-person activity in Winter and Semester 2, please refer to the on-campus subjects page.
About this subject
- Overview
- Eligibility and requirements
- Assessment
- Dates and times
- Further information
- Timetable(opens in new window)
Contact information
Term 3
Atif Ahmad
Please refer to the LMS for up-to-date subject information, including assessment and participation requirements, for subjects being offered in 2020.
Overview
Availability | Term 3 - Online |
---|---|
Fees | Look up fees |
AIMS
This subject introduces a range of information security management services implemented in industry. The subject will cover the fundamental principles and practice of security risk assessment, incident response and disaster recovery, knowledge leakage, systems and network security, and policy and culture. Students will develop an appreciation for the kinds of security practices that exist in industry in each of these areas.
This subject supports course-level objectives by allowing students to have in-depth knowledge of the specialist area of information security management. The subject’s assessment tasks include the writing of a comprehensive consulting proposal and research into critical security issues faced by organisations. These tasks will encourage students to work in a team to develop a high-level of achievement in writing, research activities, and presentation skills.
Students enrolled in the Master of Information Systems with a weighted average mark of at least 75% can take ISYS90090 Cyber Security Management instead of ISYS90070 Information Security Consulting subject to approval from the Coordinator of the Master of Information Systems.
INDICATIVE CONTENT
Security principles and techniques discussed are: Models for understanding knowledge leakage, Security Risk Assessment Methods, Firewall and virtual private network (VPN) security scenarios, and Incident Response Methodology. Real world cases will be drawn from a range of organization types including critical infrastructure installations in Australia.
Intended learning outcomes
On completion of this subject the student is expected to:
- Have developed and applied skills in critical thinking and systems analysis to identify, evaluate and/or communicate strategic and operational issues suited to the application of Information Systems Security concepts and theories to real-world practice
- Have developed and applied skills related to business communication suited to the application of Information Systems Security concepts and theories to real-world practice
- Have developed a sound knowledge and understanding of the practice of Business Information Systems Security in Organisations
- Independently research and argue disparate beliefs/theories of information systems security
- Can demonstrate an understanding of professional codes of conduct and ethical standards as they apply to Information Systems Security in practice
Generic skills
On completion of this subject, students should have developed the following generic skills:
- Have in-depth knowledge of a specialist area through exposure and study of information security areas of knowledge
- Reach a high level of achievement in writing, research or project activities problem-solving and communication through the writing of a comprehensive consulting proposal
- Report-writing skills
- Presentation skills
Last updated: 3 November 2022
Eligibility and requirements
Prerequisites
This subject is only available to students admitted to the Specialist Certificate, Graduate Certificate or Master of IT Management (Executive), or with permission of the IT Management Course Coordinator.
Corequisites
None
Non-allowed subjects
ISYS90070 Information Security Consulting
Inherent requirements (core participation requirements)
The University of Melbourne is committed to providing students with reasonable adjustments to assessment and participation under the Disability Standards for Education (2005), and the Assessment and Results Policy (MPF1326). Students are expected to meet the core participation requirements for their course. These can be viewed under Entry and Participation Requirements for the course outlines in the Handbook.
Further details on how to seek academic adjustments can be found on the Student Equity and Disability Support website: http://services.unimelb.edu.au/student-equity/home
Last updated: 3 November 2022
Assessment
Due to the impact of COVID-19, assessment may differ from that published in the Handbook. Students are reminded to check the subject assessment requirements published in the subject outline on the LMS
Description | Timing | Percentage |
---|---|---|
One individual seminar paper, requiring 25-30 hours of work. Intended Learning Outcomes (ILO's) 1, 2, 3 and 5 are addressed in the seminar paper.
| Week 5 | 30% |
One individual response to a seminar paper, requiring 13-15 hours of work. ILO's 1 and 2 are addressed in the response to the seminar paper.
| Week 7 | 10% |
A 500 word reflection on nominated contributions to discussion boards made by the student, requiring 13-15 hours of work. ILO's 1, 2 and 3 are addressed in the class discussions.
| Throughout the teaching period | 10% |
One individual written assignment (consulting proposal), requiring 70-75 hours of work. ILO's 1 to 5 are addressed in the consulting proposal.
| Week 9 | 50% |
Last updated: 3 November 2022
Dates & times
- Term 3 - Online
Principal coordinator Atif Ahmad Mode of delivery Online Contact hours 24 hours (online only) (refer Graduate Online for Clarification) Total time commitment 200 hours Pre teaching start date 13 July 2020 Pre teaching requirements All pre-teaching details will be distributed via LMS prior to commencement. Teaching period 20 July 2020 to 13 September 2020 Last self-enrol date 14 July 2020 Census date 7 August 2020 Last date to withdraw without fail 28 August 2020 Assessment period ends 20 September 2020 Term 3 contact information
Atif Ahmad
Time commitment details
200 hours
Last updated: 3 November 2022
Further information
- Texts
Prescribed texts
Whitman, M. E., & Mattord, H. J. (2014). Principles of information security. Cengage Learning. 5th Edition.
- Related Handbook entries
This subject contributes to the following:
Type Name Course Master of Information Systems (Executive) - Available through the Community Access Program
About the Community Access Program (CAP)
This subject is available through the Community Access Program (also called Single Subject Studies) which allows you to enrol in single subjects offered by the University of Melbourne, without the commitment required to complete a whole degree.
Entry requirements including prerequisites may apply. Please refer to the CAP applications page for further information.
- Available to Study Abroad and/or Study Exchange Students
This subject is available to students studying at the University from eligible overseas institutions on exchange and study abroad. Students are required to satisfy any listed requirements, such as pre- and co-requisites, for enrolment in the subject.
Last updated: 3 November 2022