MIS20100 Cybersecurity in Society

Academic Year 2020/2021

This module introduces the cybersecurity industry and its technology. Through numerous case studies, simulations, and real-world examples, students will learn how to contextualize and problematize the rise of cybersecurity in business and society, apply risk management strategies, and gain experience strategizing defensive measures and attack responses in public and private organizations. Designed for future Chief Information Officers, Chief Security Officers, IT managers, and humanities and social science scholars alike, students learn how to understand, evaluate, and critically respond to this fast-growing industry and technology landscape. This module adopts a broad and non-technical view of cybersecurity and explores novel and emerging applications of cryptographic technologies, hacking and cybercrime, advanced persistent threats, corporate espionage, and digital and corporate governance. The course approach is multidisciplinary and focuses on building business-ready skills and strategies. Readings and course activities are non-technical and do not require a prior technology background.

Show/hide contentOpenClose All

Curricular information is subject to change

Learning Outcomes:

On completion of this module, students will be able to:
• Evaluate and apply cybersecurity frameworks
• Explain how cyber technologies work and how attacks are mitigated
• Evaluate the impact of cybersecurity technologies on society
• Evaluate and measure enterprise cybersecurity risks
• Identify and evaluate criteria for cybersecurity technology procurement and implementation
• Debate ethical and social values for emerging technologies, surveillance, and privacy
• Practice teamwork and leadership skills

Indicative Module Content:

“Defining the Cybersecurity Challenge”
“Meeting the Cybersecurity Challenge”
“Enterprise Cybersecurity Architecture”
“Implementing Enterprise Cybersecurity”
“Operating Enterprise Cybersecurity”
“Building an Effective Defense”
“Responding to Incidents”
“Managing a Cybersecurity Crisis”
“Assessing Enterprise Cybersecurity”
“Measuring a Cybersecurity Program”
“Mapping Against Cybersecurity Frameworks”
“Managing an Enterprise Cybersecurity Program”
“Looking to the Future”

Student Effort Hours: 
Student Effort Type Hours
Lectures

24

Specified Learning Activities

24

Autonomous Student Learning

24

Total

72

Approaches to Teaching and Learning:
Students will independently read and assess assigned materials and engage case studies. Students will work collectively in groups outside of the classroom. Within the classroom students will actively engage lectures and work collaboratively and individually in active-learning exercises. 
Requirements, Exclusions and Recommendations

Not applicable to this module.


Module Requisites and Incompatibles
Not applicable to this module.
 
Assessment Strategy  
Description Timing Open Book Exam Component Scale Must Pass Component % of Final Grade
Continuous Assessment: Choose your own adventure (10%)
News discussion (10%)
Mid-term exam (30%)
Essay topic selection (10%)
Peer Supported Individual Essay (40%)
Throughout the Trimester n/a Graded No

100


Carry forward of passed components
No
 
Resit In Terminal Exam
Spring Yes - 2 Hour
Please see Student Jargon Buster for more information about remediation types and timing. 
Feedback Strategy/Strategies

• Feedback individually to students, post-assessment
• Group/class feedback, post-assessment

How will my Feedback be Delivered?

Feedback provided directly for individual assignment, collectively for group assignment. Quizzes and exams will be marked and you will receive feedback individually.

Enterprise Cybersecurity (2015)
How to Build a Successful Cyberdefense Program Against Advanced Threats
Authors: Donaldson, S., Siegel, S., Williams, C.K., Aslam, A.
Print and Ebook: https://www.apress.com/gp/book/9781430260820

Harvard Business Publishing coursepack: https://hbsp.harvard.edu/import/753711
Name Role
Dr Quinn Dupont Lecturer / Co-Lecturer