Overview
The last decade’s rapid acceleration of network technology and the unparalleled growth of the Internet have led to increased risks to information and systems. Continuous advancements in technology and the relative ease with which people are able to access, manipulate, and store information has further compounded such risks, especially with organizations and societies heavily dependent on information and systems for survival.
This course explores the world of technology and information security from a risk management perspective. Through an understanding of history and the examination of trends in today’s technology landscape, the course investigates the sources of risk and its business implications. Practical hands-on methodologies on the handling of risks are covered, as well as the process of reviewing and developing security management plans and governance frameworks.
Objectives
By the end of this course, students should be able to:
- Explain risk, the concept of risk management and how it may impact individuals and organizations.
- Recognize potential sources of risk, whether on personal or corporate networks.
- Analyze risks and understand steps to develop risk assessments.
- Understand best practices and methods to combat risks, vulnerabilities, and threats.
- Conduct an analysis of how information security risks impact businesses.
- Develop plans to respond to security incidents and recover from related disaster.
Evaluation
Grading will be based on weekly Think Tank discussions / assignments (participation), and a final report.
To receive a passing grade in this course, you must meet these minimum standards:
- receive a minimum of 60% on the participation component (i.e., discussions in Think Tanks and assignments); and
- receive an average grade of 60% over all course components.
Marks for this course will be distributed as follows:
Activity | Weight |
Assignment 1 | 30% |
Assignment 2 | 10% |
Assignment 3 | 20% |
Participation in Think Tanks (Discussions) | 40% |
Total | 100% |
Materials
Physical course materials
The following course materials are included in a course package that will be shipped to your home prior to your course’s start date:
Gibson, D., & Igonor, A. (2021). Managing risk in information systems (3rd ed.). Burlington, MA: Jones and Bartlett Learning.
Dempsey, T. (2015). Navigating the digital age: The definitive cybersecurity guide for directors and officers. Chicago, IL: Caxton Business & Legal, Inc.
Additional readings are provided in the course Digital Reading Room.