Nowadays, we live our lives in a highly digitalised and networked world. Similarly, most (if not all) of modern organisations rely on computers, the internet, cloud services or other digital devices and systems to manage their data, processes, workforce and other assets. In such a highly digitalised and networked world, how can organisations manage the security of their data, systems, processes and other assets?
You will gain a systematic understanding of many important aspects of information security management, such as what standard processes and practices to follow, how to assess and manage risks, how to manage AAA (authentication, authorisation and accountability), how to understand the complicated cyber law landscape to ensure legal compliance, how to ensure security controls and processes are usable for all, and how to foster a people-centric culture for information security among staff.
Such systematic understanding will equip you with crucial socio-technical skills needed for being a confident and well-informed information security manager at any organisation you choose to work for.
Total Contact Hours (Lectures and Classes) 32
Online and take-home test worth 20%.
Online and take-home test worth 30%.
Examination worth 50%.
Reassessment Method: Like-for-like Including composite form of reassessment for failed practical components – written online test, and Examination.
On successfully completing the module, students will be able to:
Assess, implement, and evaluate information security management processes by applying recognized standards and best practices to real-world organisational scenarios.
Conduct security risk assessments and communicate the findings to relevant stakeholders effectively.
Critically analyse the roles of authentication, authorisation and accountability in information security management and propose practical solutions.
Analyse and evaluate the evolving cyber law landscape and create legally compliant cyber security solutions in real-world scenarios.
Apply their understanding of different human factors in information security management to real-world business cases.
University of Kent makes every effort to ensure that module information is accurate for the relevant academic session and to provide educational services as described. However, courses, services and other matters may be subject to change. Please read our full disclaimer.