Faculty of Health, Engineering and Science

School: Computer and Security Science

This unit information may be updated and amended immediately prior to semester. To ensure you have the correct outline, please check it again at the beginning of semester.

  • Unit Title

    IT Security Management
  • Unit Code

    CSG3309
  • Year

    2015
  • Enrolment Period

    1
  • Version

    1
  • Credit Points

    15
  • Full Year Unit

    N
  • Mode of Delivery

    On Campus
    Online

Description

This unit deals with management issues encountered as a result of deploying security countermeasures, policy and initiatives in organisational settings. Current and future issues relating to information technology security management will be explored in the unit.

Prerequisite Rule

Students must pass 1 units from CSI2102

Learning Outcomes

On completion of this unit students should be able to:

  1. Advise on information technology security management issues and related policy.
  2. Analyse and report on information technology security management issues and emergent trends.
  3. Apply information security and risk standards and IT security baselines to a given context.
  4. Create a contingency plan for a given IT environment.
  5. Demonstrate an understanding of the current legal and ethical positions that relate to information technology security management issues.
  6. Detail current information technology security management issues.
  7. Outline the impact of emergent technological developments on information technology security management.
  8. Outline the impacts of compliance on information technology security management practices.

Unit Content

  1. Emergent trends in information technology security management.
  2. Implementation issues in information technology security management.
  3. International standards in information technology security.
  4. Legal and ethical issues.
  5. Personnel issues.
  6. Technical issues in information technology security management.

Additional Learning Experience Information

Lectures, workshops, and case studies

Assessment

GS1 GRADING SCHEMA 1 Used for standard coursework units

Students please note: The marks and grades received by students on assessments may be subject to further moderation. All marks and grades are to be considered provisional until endorsed by the relevant Board of Examiners.

ON CAMPUS
TypeDescriptionValue
AssignmentWorkshop portfolio10%
Case StudyGroup case study of IT security implementation50%
Examination ^End of semester examination40%
ONLINE
TypeDescriptionValue
AssignmentWorkshop portfolio10%
Case StudyGroup case study of IT security implementation50%
Examination ^End of semester examination40%

^ Mandatory to Pass

Text References

  • ^ Whitman, M. E., Mattord, H. J. (2012). Management of Information Security (4th Ed.). Boston: Cengage.
  • Duquenoy, P., Jones, S., Blundell, B. (2008). Ethical, Legal and Professional Issues in Computing. London: Thomson.
  • Standards Australia International. (2001). Information security management. Part 2, Specification for information security management systems. Strathfield, NSW: Standards Australia International.
  • Greene, S. (2006). Security Policies and Procedures Principles and Practices. Upper Saddle River, NJ: Pearson.
  • Standards Australia International. (2006). Risk management standard AS/NZS 27002. Strathfield, NSW: Standards Australia International.
  • Whitman, M. E., Mattord, H. J. (2012). Management of Information Security (4th ed.). Boston, MA: Course Technology
  • Reynolds, G. (2007). Ethics in Information Technology (2nd ed.). Boston, MA: Course Technology.

^ Mandatory reference


Disability Standards for Education (Commonwealth 2005)

For the purposes of considering a request for Reasonable Adjustments under the Disability Standards for Education (Commonwealth 2005), inherent requirements for this subject are articulated in the Unit Description, Learning Outcomes and Assessment Requirements of this entry. The University is dedicated to provide support to those with special requirements. Further details on the support for students with disabilities or medical conditions can be found at the Access and Inclusion website.

Academic Misconduct

Edith Cowan University has firm rules governing academic misconduct and there are substantial penalties that can be applied to students who are found in breach of these rules. Academic misconduct includes, but is not limited to:

  • plagiarism;
  • unauthorised collaboration;
  • cheating in examinations;
  • theft of other students' work;

Additionally, any material submitted for assessment purposes must be work that has not been submitted previously, by any person, for any other unit at ECU or elsewhere.

The ECU rules and policies governing all academic activities, including misconduct, can be accessed through the ECU website.

CSG3309|1|1

Faculty of Health, Engineering and Science

School: Computer and Security Science

This unit information may be updated and amended immediately prior to semester. To ensure you have the correct outline, please check it again at the beginning of semester.

  • Unit Title

    IT Security Management
  • Unit Code

    CSG3309
  • Year

    2015
  • Enrolment Period

    2
  • Version

    1
  • Credit Points

    15
  • Full Year Unit

    N
  • Mode of Delivery

    On Campus
    Online

Description

This unit deals with management issues encountered as a result of deploying security countermeasures, policy and initiatives in organisational settings. Current and future issues relating to information technology security management will be explored in the unit.

Prerequisite Rule

Students must pass 1 units from CSI2102

Learning Outcomes

On completion of this unit students should be able to:

  1. Advise on information technology security management issues and related policy.
  2. Analyse and report on information technology security management issues and emergent trends.
  3. Apply information security and risk standards and IT security baselines to a given context.
  4. Create a contingency plan for a given IT environment.
  5. Demonstrate an understanding of the current legal and ethical positions that relate to information technology security management issues.
  6. Detail current information technology security management issues.
  7. Outline the impact of emergent technological developments on information technology security management.
  8. Outline the impacts of compliance on information technology security management practices.

Unit Content

  1. Emergent trends in information technology security management.
  2. Implementation issues in information technology security management.
  3. International standards in information technology security.
  4. Legal and ethical issues.
  5. Personnel issues.
  6. Technical issues in information technology security management.

Additional Learning Experience Information

Lectures, workshops, and case studies

Assessment

GS1 GRADING SCHEMA 1 Used for standard coursework units

Students please note: The marks and grades received by students on assessments may be subject to further moderation. All marks and grades are to be considered provisional until endorsed by the relevant Board of Examiners.

ON CAMPUS
TypeDescriptionValue
AssignmentWorkshop portfolio10%
Case StudyGroup case study of IT security implementation50%
Examination ^End of semester examination40%
ONLINE
TypeDescriptionValue
AssignmentWorkshop portfolio10%
Case StudyGroup case study of IT security implementation50%
Examination ^End of semester examination40%

^ Mandatory to Pass

Text References

  • ^ Whitman, M. E., Mattord, H. J. (2012). Management of Information Security (4th Ed.). Boston: Cengage.
  • Duquenoy, P., Jones, S., Blundell, B. (2008). Ethical, Legal and Professional Issues in Computing. London: Thomson.
  • Standards Australia International. (2001). Information security management. Part 2, Specification for information security management systems. Strathfield, NSW: Standards Australia International.
  • Greene, S. (2006). Security Policies and Procedures Principles and Practices. Upper Saddle River, NJ: Pearson.
  • Standards Australia International. (2006). Risk management standard AS/NZS 27002. Strathfield, NSW: Standards Australia International.
  • Whitman, M. E., Mattord, H. J. (2012). Management of Information Security (4th ed.). Boston, MA: Course Technology
  • Reynolds, G. (2007). Ethics in Information Technology (2nd ed.). Boston, MA: Course Technology.

^ Mandatory reference


Disability Standards for Education (Commonwealth 2005)

For the purposes of considering a request for Reasonable Adjustments under the Disability Standards for Education (Commonwealth 2005), inherent requirements for this subject are articulated in the Unit Description, Learning Outcomes and Assessment Requirements of this entry. The University is dedicated to provide support to those with special requirements. Further details on the support for students with disabilities or medical conditions can be found at the Access and Inclusion website.

Academic Misconduct

Edith Cowan University has firm rules governing academic misconduct and there are substantial penalties that can be applied to students who are found in breach of these rules. Academic misconduct includes, but is not limited to:

  • plagiarism;
  • unauthorised collaboration;
  • cheating in examinations;
  • theft of other students' work;

Additionally, any material submitted for assessment purposes must be work that has not been submitted previously, by any person, for any other unit at ECU or elsewhere.

The ECU rules and policies governing all academic activities, including misconduct, can be accessed through the ECU website.

CSG3309|1|2