USQ Logo
The current and official versions of the course specifications are available on the web at https://www.usq.edu.au/course/specification/current.
Please consult the web for updates that may occur during the year.

CIS5205 Management of Information Security

Semester 2, 2022 Online
Units : 1
Faculty or Section : Faculty of Business, Education, Law and Arts
School or Department : School of Business
Student contribution band : Band 2
Grading basis : Graded
Version produced : 27 June 2022

Staffing

Examiner: Michael Lane

Requisites

Co-requisite: CIS5100

Overview

Information Communications and Technology professionals need to develop a good breadth of knowledge and skills required for the secure management of information technology and communications assets for organisations. Students must have a good working knowledge of the role of information security in providing an appropriate level of confidentiality, integrity and availability for ICT Assets while considering the legal, privacy and ethical implications. Students need to develop the knowledge and skills using a range of security technologies and tools to identify potential threats and vulnerabilities that may exist in business systems and networks and manage security architecture and design and the associated risks and legal, privacy and ethical issues that may rise. This course provides students with an intermediate knowledge of the key principles necessary for managing the security of an organisation's ICT assets including information, information systems and networks.

Students study contemporary information security theory and practice in the context of threats, attacks and vulnerabilities that may exist in relation to organisation's information, communications and technology assets and the controls that can be put in place to ensure that the risks are managed at an acceptable level. Students will develop their skills and knowledge so that they can evaluate information security situations. They will be able to identify specific threats, attacks, vulnerabilities and manage security architecture and design and legal, privacy or ethical issues that may arise. They will be able to clearly communicate and provide advice and guidance to business managers and operational employees to manage the risks identified. Students will be assessed on their understanding of key concepts of information security and their ability to apply and communicate effectively contemporary information security theory and practice to real world problems.

Course learning outcomes

On successful completion of this course students should be able to:

  1. analyse and evaluate the potential risks associated information security vulnerabilities, attacks and threats and explain how security architecture, design and controls that can be applied to mitigate those potential risks;
  2. analyse systems and hardware failures and provide advice and guidelines on disaster recovery and business continuity plans for critical recovering information and operational systems;
  3. evaluate and explain legal privacy and ethical situations to effectively managing information security;
  4. communicate effectively both written and orally by providing advise and guidance on the risks and technical and people issues associated with management of information security to business managers and operational employees in organisations.

Topics

Description Weighting(%)
1. Threats, Attacks and Vulnerabilities 20.00
2. Security Technologies and Tools 15.00
3. Security Architecture and Design 20.00
4. Identity and Access Management 15.00
5. Risk management 10.00
6. Cryptography and Public Key Infrastructure 10.00
7. Legal, privacy and ethical considerations 10.00

Text and materials required to be purchased or accessed

Conklin, WMA, White, G, Cothren, C & Williams, D 2018, Principles of computer security: CompTIA security+ and beyond (exam SY0-501), 5th edn, McGraw-Hill, New York.
(includes CD.)
All students will need access to a PC word processing and spreadsheet package. Any package will suffice.
Students also need MS Windows to view multimedia materials.

Student workload expectations

To do well in this subject, students are expected to commit approximately 10 hours per week including class contact hours, independent study, and all assessment tasks. If you are undertaking additional activities, which may include placements and residential schools, the weekly workload hours may vary.

Assessment details

Approach Type Description Group
Assessment
Weighting (%) Course learning outcomes
Assignments Written Quiz 1 No 10 1
Assignments Written Report 1 No 20 3,4
Assignments Written Quiz 2 No 20 2,3
Assignments Written Report 2 No 50 1,2,3,4
Date printed 27 June 2022