Information Security Management Module

In this module, we will explore the effects of cybersecurity on network systems and designs, with a specific focus on network vulnerability assessments. We will discuss methods for scanning, evaluating, and sometimes mitigating network vulnerabilities. Additionally, we will consider the field of vulnerability assessments and explain the various mechanisms and approaches encompassed in the Vulnerability Assessment Continuum.

The goal of this module is to equip students with the following knowledge and skills related to security and vulnerability assessment in information networks:

● Understanding the fundamentals of vulnerability assessment in various systems.

● Understanding the basics of security provision in information networks.

● Familiarity with the various protocols and architectures used by network systems.

● A thorough understanding of the use and benefits of monitoring and logging tools.

● Ability to create and use security vulnerability and assessment tools.

● Capability to present critical arguments for specific actions or outcomes to a diverse audience.

● Opportunity to reflect on and evaluate personal development.

Upon completion of this module, students will acquire the following skills:

1. Identification and analysis of security threats and vulnerabilities in network systems. You will also learn to determine appropriate methodologies, tools, and techniques to manage and solve them.

2. Design and critically evaluate computer programs and systems that can produce solutions to manage and audit risk and security issues.

3. Gather and synthesise information from multiple sources, including internet security alerts and warning sites, to aid in systematically analysing security breaches and issues.

4. Expression of the legal, social, ethical, and professional issues information security and risk professionals face.

Unit 1
An Introduction to Security and Risk Management

Required Reading

Learning Outcomes

Case Study

Collaborative Discussion 1

Reflection

Unit 3
Introduction to Threat Modelling and Management

Required Reading

Learning Outcomes

Formative Activities

Reflection

Assessment: Tutor's Feedback

Unit 5
Future Trends in Security and Risk Management

Required Reading

Learning Outcomes

Formative Activities

Wiki Activity

Reflection

Unit 6
The Great Debate - What Will be the Most Influential Trend in ISM in the Next 5 Years?

Required Reading

Learning Outcomes

Seminar

Reflection

Assessment: Tutor's Feedback