Overview
To view overview information, please select an offering from the drop-down menu above.
Academic contacts
To view unit coordinator information, please select an offering from the drop-down menu above.
Offerings
DUBAI-ISC-TJD-INT-2020-2020
DUBAI-ISC-TJD-INT-2022-2022
DUBAI-ISC-TMD-INT-2018-2019
DUBAI-ISC-TMD-INT-2021-2021
DUBAI-ISC-TMD-INT-2023-2023
DUBAI-ISC-TSD-INT-2020-2020
DUBAI-ISC-TSD-INT-2022-2022
KAPLAN-SGP-TJA-INT-2020-2020
KAPLAN-SGP-TJA-INT-2022-2022
KAPLAN-SGP-TMA-INT-2019-2019
KAPLAN-SGP-TMA-INT-2021-2021
KAPLAN-SGP-TMA-INT-2023-2023
KAPLAN-SGP-TSA-INT-2020-2020
KAPLAN-SGP-TSA-INT-2022-2022
MURDOCH-S1-EXT-2018-ONGOING
MURDOCH-S1-INT-2018-ONGOING
Requisites
Prerequisite
Exclusion
Other learning activities
To view other learning activity information, please select an offering from the drop-down menu above.
Learning activities
To view learning activity information, please select an offering from the drop-down menu above.
Learning outcomes
1.
Describe and discuss the importance and the key characteristics of information security, as well as the principal components of information security system implementation planning in the organizational planning scheme.
2.
Explain the need for contingency planning and discuss how an organization would prepare and execute a test of contingency plans.
3.
Define what an information security policy is; describe the major types of information security policy and discuss the major components of each.
4.
Discuss how to plan and staff an organization’s information security program based on its size; recommend an information security management model and explain how it can be customized to meet the needs of a particular organization; identify the skills and requirements for information security positions.
5.
Define risk management and explain how risk is assessed based on the likelihood of adverse events and the possible effects on information assets.
6.
Describe the types of intrusion detection systems and the strategies on which they are based; discuss security practices used to control employee behaviour and prevent misuse of information; explain ethical and legal issues associated with the management of information security.
7.
Understand and discuss the importance of information security governance and its implementation mechanisms; outline the basic components of the COBIT model.
8.
Demonstrate an awareness of information security standards in high-risk industry sectors.
Assessments
To view assessment information, please select an offering from the drop-down menu above.
Additional information
Unit content:· Introduction to the Management of Information Security
· Planning for Security
· Planning for Contingencies
· Information Security Policy
· Developing the Security Program
· Security Management Models
· Security Management Practices
· Risk Management: Identifying and Assessing Risk
· Controlling Risk
· Protection Mechanisms
· Personnel and Security
· Law and Ethics for Information Security