Course Name (English)
|
MANAGEMENT OF INFORMATION SECURITY
|
Course Code |
ASM655 |
Course Description |
The course focuses on the managerial aspects of information security, such as access control models, information security governance, and information security program assessment and metrics. Coverage on the foundational and technical components of information security is included to reinforce key concepts. This course offers a unique overview of information security from a management perspective while maintaining a finger on the pulse of industry changes and academic relevance. This course also reviews some of the recent issues in information security and how to secure information in modern organizations.
|
Transferable Skills |
Students able to discuss the concepts of cyber and information security and the key practices and processes for managing security effectively. Students are also capable to apply the practice used in legal, ethical, and regulatory issues that shape policy development and the ways in which organizations implement and administer security. |
Teaching Methodologies |
Lectures, Blended Learning, Case Study, Small Group Sessions , Problem-based Learning |
CLO |
CLO1 |
Discuss the concepts of cyber and information security and the key practices and processes for managing security effectively |
CLO2 |
Apply the access controls and authentication as they are used to secure systems and how they can be mitigated |
CLO3 |
Apply the practice used in legal, ethical, and regulatory issues that shape policy development and the ways in which organizations implement and administer security |
|
Pre-Requisite Courses |
No course recommendations |
Reading List | Recommended Text | - Michael E. Whitman,Herbert J. Mattford 2018, Management of Information Security, 6th Edition Ed., Cengage Singapore [ISBN: 9789814834735]
|
---|
Reference Book Resources | - Michael E. Whitman,Herbert J. Mattord 2013, Management of Information Security, 4th Edition Ed., Cengage Learning [ISBN: 9781285062297]
- Alan, C. and Steve, W. 2008, IT Governance: A Manager's Guide to Data Security, 3rd edition Ed.
- William, S. and Lawrie,B. 2016, Computer Security: Principles and Practice, Pearson
- David, B., Patrick, S., and Michael, S. 2011, Applied Information Security: A Hands-on Approach
|
---|
|
---|
Article/Paper List | This Course does not have any article/paper resources |
---|
Other References | This Course does not have any other resources |
---|
|