Information on this page, including unit offerings, is from the 2020 academic year.
Applied Information Security Management (ICT502)
|Organisational Unit||Information Technology, Mathematics and Statistics|
|Availability||MURDOCH: S2-internal, S2-external|
|Teaching Timetables||Murdoch S2
|Description||Information security managers design, build and manage enterprise information security. This unit focuses on enabling students to use the tools of threat and vulnerability assessment, security policy and procedure, and strategic decision making for information security management. Students work in teams within a realistic enterprise environment to develop enterprise security policy to deal with challenges to Information Security.|
|Unit Learning Outcomes||ULO1. Describe the importance of security of both resources and data in terms of threat, vulnerability and protection.
ULO2. Describe the different types and methods of securing an organisation's data and information technology infrastructure.
ULO3. Outline the management of the security aspects of an organisation's IT infrastructure and data resources.
ULO4. Identify the benefits and weaknesses of different methods of enforcing security, and appropriate methods for securing different types of systems.
ULO5. Demonstrate an awareness of both managerial and legal issues involved in the management of IT security.
|Timetabled Learning Activities||Lectures/Workshops: 3 hours per week.|
|Unit Learning Experiences||The approach to learning in this unit is to attempt to promote active thinking among students, encouraging them to apply the theoretical information security management concepts to practical, real-world scenarios. Learning in the unit attempts to encourage a holistic view of information security that reflects a need for an integrated understanding that genuinely addresses relevant issues, and this pedagogically connects with an approach that encourages deep, rather than surface, learning. Student-directed workshops reflect this approach.
The approach to learning in this unit involves the use of lectures alongside workshops and electronic resources.
There is a 1-hour lecture and 2-hour workshop each week that will cover the theoretical content, practical instruction and assessment. The sessions are designed specifically to be interactive and include opportunity for interaction with the lecturer and other students in the unit.
|Other Learning Experiences||Students complete a major group project cumulatively over the course of semester.|
|Assessment||Assessment in this unit reflects the practical need for students to genuinely engage with the information security management concepts being taught, and apply them in realistic scenarios. Feedback is provided during interactive workshop sessions and on written work.
Workshop participation -- quality of contribution -- 10%
Security Master Plan Report - Group Report comprising work completed in the workshops. - 30%.
Presentation -- professional group presentation of report summary -- 10%
Examination - closed book - 50%.
Research Essay- 20%
Security Master Plan Report - 30%
Examination - closed book - 50%.
|Prerequisites||Enrolment in a graduate IT course or permission of the Academic Chair.|
|Exclusions||Students who have completed ICT557/ICT357 Information Security Management may not enrol in this unit for credit.|
|Appears in these Courses/Majors:
see individual structures for context
|Internet Access Requirements||Murdoch units normally include an online component comprising materials, discussions, lecture recordings and assessment activities. All students, regardless of their location or mode of study, need to have access to and be able to use computing devices with browsing capability and a connection to the Internet via Broadband (Cable, ADSL or Mobile) or Wireless. The Internet connection should be readily available and allow large amounts of data to be streamed or downloaded (approximately 100MB per lecture recording). Students also need to be able to enter into online discussions and submit assignments online.|