Information Security Management - COMP6005

Looking for a different module?

Module delivery information

Location Term Level1 Credits (ECTS)2 Current Convenor3 2025 to 2026
Canterbury
Autumn Term 6 20 (10) Shujun Li checkmark-circle

Overview

Nowadays, we live our lives in a highly digitalised and networked world. Similarly, most (if not all) of modern organisations rely on computers, the internet, cloud services or other digital devices and systems to manage their data, processes, workforce and other assets. In such a highly digitalised and networked world, how can organisations manage the security of their data, systems, processes and other assets?
You will gain a systematic understanding of many important aspects of information security management, such as what standard processes and practices to follow, how to assess and manage risks, how to manage AAA (authentication, authorisation and accountability), how to understand the complicated cyber law landscape to ensure legal compliance, how to ensure security controls and processes are usable for all, and how to foster a people-centric culture for information security among staff.
Such systematic understanding will equip you with crucial socio-technical skills needed for being a confident and well-informed information security manager at any organisation you choose to work for.

Details

Contact hours

Total Contact Hours (Lectures and Classes) 32

Method of assessment

Online and take-home test worth 20%.
Online and take-home test worth 30%.
Examination worth 50%.

Reassessment Method: Like-for-like Including composite form of reassessment for failed practical components – written online test, and Examination.

Indicative reading

Learning outcomes

On successfully completing the module, students will be able to: 
Assess, implement, and evaluate information security management processes by applying recognized standards and best practices to real-world organisational scenarios.
Conduct security risk assessments and communicate the findings to relevant stakeholders effectively.
Critically analyse the roles of authentication, authorisation and accountability in information security management and propose practical solutions.
Analyse and evaluate the evolving cyber law landscape and create legally compliant cyber security solutions in real-world scenarios.
Apply their understanding of different human factors in information security management to real-world business cases.

Notes

  1. Credit level 6. Higher level module usually taken in Stage 3 of an undergraduate degree.
  2. ECTS credits are recognised throughout the EU and allow you to transfer credit easily from one university to another.
  3. The named convenor is the convenor for the current academic session.
Back to top

University of Kent makes every effort to ensure that module information is accurate for the relevant academic session and to provide educational services as described. However, courses, services and other matters may be subject to change. Please read our full disclaimer.