USQ Logo
The current and official versions of the course specifications are available on the web at
Please consult the web for updates that may occur during the year.

UCS8013 Insider Cyber Threats

8W Teaching Period 2, 2022 Online
Units : 0.25
Faculty or Section : Faculty of Business, Education, Law and Arts
School or Department : School of Business
Student contribution band : Band 2
Grading basis : Graded
Version produced : 27 June 2022


Insider threats come from within organisational trust boundaries and as such are very different to cyber threats originating from outside the organisation. They can be difficult to detect and can cause significant risk and impact. Understanding the insider threat, and how it can be detected and mitigated is a critical objective to reduce cyber risk and a vital control for organisations. Students will learn about what insider cyber threats are, how to detect them, and how to mitigate against them. Real world examples from multiple industries are used to illustrate key principles.

The minicourse provides an understanding of threats to cyber security of an organisation that are posed from within the internal environment of the organisation. Students will learn about the range and nature of insider cyber threats that occur maliciously, as a result of negligence or through the organisation's supply chain. Students will also learn what system, tools and approaches organisations can exploit to detect or predict insider cyber threats or what defence they need to consider in their overall security strategy and approach.

Course learning outcomes

On successful completion of this course students should be able to:

  1. analyse information, concepts and theories related to human roles in insider threats (CIS8710 LO2)
  2. analyse and apply specialist knowledge related to managing human factors and behaviour to counter insider cyber threats (CIS8710 LO3, LO4)
  3. analyse, evaluate and apply sources of specialist human behavioural knowledge relating to cyber security knowledge, and how these can be applied towards improved cyber security controls (CIS8710 LO4).


Description Weighting(%)
1. Introduction to insider threats: This topic introduces students to the concept of insider threat within a cyber security context. It explores different types of insider threats and discusses how they occur 25.00
2. Supply chain attacks: This topic gives students an understanding of a supply chain attack. It explores different types of supply chain attacks and how they occur from within the organisation’s supply chain 25.00
3. Detection of insider threats: This topic discusses insider threat detection systems and approaches 25.00
4. Human centric controls for managing insider threats: This topic covers a variety of controls that help deter and discourage insider attacks on an organisation 25.00

Text and materials required to be purchased or accessed

All resources can be downloaded from the learning platform.

Assessment details

Description Weighting (%)
Date printed 27 June 2022