Handbook home
Cyber Security Management (ISYS90090)
Graduate courseworkPoints: 12.5On Campus (Parkville)
About this subject
- Overview
- Eligibility and requirements
- Assessment
- Dates and times
- Further information
- Timetable (login required)(opens in new window)
Contact information
Semester 2
Overview
Availability | Semester 2 |
---|---|
Fees | Look up fees |
AIMS
This subject introduces a range of information security management services implemented in industry. The subject will cover the fundamental principles and practice of security risk assessment, incident response and disaster recovery, knowledge leakage, systems and network security, and policy and culture. Students will develop an appreciation for the kinds of security practices that exist in industry in each of these areas.
This subject supports course-level objectives by allowing students to have in-depth knowledge of the specialist area of information security management. The subject’s assessment tasks include the writing of a comprehensive consulting proposal and research into critical security issues faced by organisations. These tasks will encourage students to work in a team to develop a high-level of achievement in writing, research activities, and presentation skills.
INDICATIVE CONTENT
Security principles and techniques discussed are: Models for understanding knowledge leakage, Security Risk Assessment Methods, Firewall and virtual private network (VPN) security scenarios, and Incident Response Methodology. Real world cases will be drawn from a range of organization types including critical infrastructure installations in Australia.
Intended learning outcomes
On completion of this subject, students should be able to:
- Have developed and applied skills in critical thinking and systems analysis to identify, evaluate and/or communicate strategic and operational issues suited to the application of information systems security concepts and theories to real-world practice
- Have developed and applied skills related to business communication suited to the application of information systems security concepts and theories to real-world practice
- Have developed a sound knowledge and understanding of the practice of business information systems security in organisations
- Independently research and argue disparate beliefs/theories of information systems security
- Apply the professional codes of conduct and ethical standards as they pertain to information systems security in practice
Generic skills
On completion of this subject, students should have developed the following generic skills:
- Have in-depth knowledge of a specialist area through exposure and study of information security areas of knowledge
- Reach a high level of achievement in writing, research or project activities problem-solving and communication through the writing of a comprehensive consulting proposal
- Report-writing skills
- Presentation skills
Last updated: 8 May 2024
Eligibility and requirements
Prerequisites
Code | Name | Teaching period | Credit Points |
---|---|---|---|
ISYS90026 | Concepts in Information Systems |
Semester 2 (On Campus - Parkville)
Semester 1 (On Campus - Parkville)
|
12.5 |
OR
Selection of the Cyber Security specialisation (formal) in the MC-IT Master of Information Technology AND special permission from the subject coordinator
OR
Admission into the Information Systems specialisation (formal) in the MC-DINFENG Master of Digital Infrastructure Engineering
Corequisites
None
Non-allowed subjects
Code | Name | Teaching period | Credit Points |
---|---|---|---|
ISYS90070 | Information Security Consulting | Not available in 2024 |
12.5 |
Inherent requirements (core participation requirements)
The University of Melbourne is committed to providing students with reasonable adjustments to assessment and participation under the Disability Standards for Education (2005), and the Assessment and Results Policy (MPF1326). Students are expected to meet the core participation requirements for their course. These can be viewed under Entry and Participation Requirements for the course outlines in the Handbook.
Further details on how to seek academic adjustments can be found on the Student Equity and Disability Support website: http://services.unimelb.edu.au/student-equity/home
Last updated: 8 May 2024
Assessment
Description | Timing | Percentage |
---|---|---|
Written Assignment - One individual report, requiring 25-30 hours of work. Intended Learning Outcomes (ILO's) 1, 2, 3 and 5 are addressed in the seminar paper.
| Week 5 | 30% |
Other - A 1,000 word written reflection on nominated contributions to discussion boards made by the student, requiring 26-30 hours of work. ILO's 1, 2 and 3 are addressed in the class discussions.
| During the examination period | 20% |
Written Assignment- One group (4-6 members) written assignment (consulting proposal), requiring 70-75 hours of work. ILO's 1 to 5 are addressed in the consulting proposal.
| During the examination period | 50% |
Last updated: 8 May 2024
Dates & times
- Semester 2
Principal coordinator Atif Ahmad Mode of delivery On Campus (Parkville) Contact hours One 1-hour lecture per week 24 hours of synchronous contact (2h of tutorials per week) 36 contact hours in total Total time commitment 200 hours Teaching period 22 July 2024 to 20 October 2024 Last self-enrol date 2 August 2024 Census date 2 September 2024 Last date to withdraw without fail 20 September 2024 Assessment period ends 15 November 2024 Semester 2 contact information
Time commitment details
200 hours
What do these dates mean
Visit this webpage to find out about these key dates, including how they impact on:
- Your tuition fees, academic transcript and statements.
- And for Commonwealth Supported students, your:
- Student Learning Entitlement. This applies to all students enrolled in a Commonwealth Supported Place (CSP).
Subjects withdrawn after the census date (including up to the ‘last day to withdraw without fail’) count toward the Student Learning Entitlement.
Last updated: 8 May 2024
Further information
- Texts
Prescribed texts
Whitman, M. E., & Mattord, H. J. (2014). Principles of information security. Cengage Learning. 5th Edition.
- Related Handbook entries
This subject contributes to the following:
Type Name Course Master of Information Technology - Available through the Community Access Program
About the Community Access Program (CAP)
This subject is available through the Community Access Program (also called Single Subject Studies) which allows you to enrol in single subjects offered by the University of Melbourne, without the commitment required to complete a whole degree.
Entry requirements including prerequisites may apply. Please refer to the CAP applications page for further information.
- Available to Study Abroad and/or Study Exchange Students
This subject is available to students studying at the University from eligible overseas institutions on exchange and study abroad. Students are required to satisfy any listed requirements, such as pre- and co-requisites, for enrolment in the subject.
Last updated: 8 May 2024