{"id":6482,"date":"2023-05-31T14:21:35","date_gmt":"2023-05-31T11:21:35","guid":{"rendered":"https:\/\/www.uol.ac.cy\/?post_type=courses&#038;p=6482"},"modified":"2024-10-17T13:19:03","modified_gmt":"2024-10-17T10:19:03","slug":"bi425-diacheirisi-tis-asfaleias-ton-pliroforion-gia-tis-epicheiriseis-5","status":"publish","type":"courses","link":"https:\/\/www.uol.ac.cy\/el\/courses\/bi425-information-security-management-for-business\/","title":{"rendered":"BI425 - \u0394\u03b9\u03b1\u03c7\u03b5\u03af\u03c1\u03b9\u03c3\u03b7 \u03b1\u03c3\u03c6\u03ac\u03bb\u03b5\u03b9\u03b1\u03c2 \u03c0\u03bb\u03b7\u03c1\u03bf\u03c6\u03bf\u03c1\u03b9\u03ce\u03bd \u03b3\u03b9\u03b1 \u03b5\u03c0\u03b9\u03c7\u03b5\u03b9\u03c1\u03ae\u03c3\u03b5\u03b9\u03c2"},"content":{"rendered":"","protected":false},"featured_media":0,"template":"","meta":{"_acf_changed":false,"_seopress_robots_primary_cat":"","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","_uag_custom_page_level_css":"","site-sidebar-layout":"default","site-content-layout":"default","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"default","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}}},"class_list":["post-6482","courses","type-courses","status-publish","hentry"],"acf":[],"spectra_custom_meta":{"_last_editor_used_jetpack":["classic-editor"],"_edit_lock":["1729160587:17"],"_edit_last":["17"],"c_course_main_title":["Master in Business Administration"],"_c_course_main_title":["field_6447c49f617d3"],"c_course_unit_title":["Information Security Management for Business"],"_c_course_unit_title":["field_6447c246335b9"],"course_unit_code":["BI425"],"_course_unit_code":["field_63f6047058b75"],"type_of_unit":["Elective"],"_type_of_unit":["field_63f6047758b76"],"level_of_course_unit":["Second cycle"],"_level_of_course_unit":["field_63f6047c58b77"],"year_of_study":["First\/second year"],"_year_of_study":["field_63f6048558b78"],"semester":["On demand "],"_semester":["field_63f6049158b79"],"number_of_ects_credits":["6"],"_number_of_ects_credits":["field_63f6049b58b7a"],"class_contact_hours":["28"],"_class_contact_hours":["field_63f604a358b7b"],"course_unit_objectives":["The aims of this course is to teach the students the fundamentals behind security engineering principles that underpin today\u2019s cyber world. The course introduces the concepts and issues related to security of systems, data and infrastructures and presents the state-of-art techniques for mitigating cyber threats and ensuring compliance with regulations and policies. The course covers both technical, like cryptographic primitives and security designs, and managerial material that needed to be understood by a leader in an IT organization. Upon completion of this course, students will acquire the necessary understanding and critical thinking for assessing threats based on widely-used risk-assessment methodologies and being in position to lead the implementation of an Information Security Management System (ISMS) in their enterprise or organization."],"_course_unit_objectives":["field_63f606bd0ec15"],"c_learning_outcomes":["The students completing the course should be able to:"],"_c_learning_outcomes":["field_63f607e69bd76"],"c_learning_outcomes_description":["<ul>\r\n \t<li>Understand fundamental security notions such as confidentiality, integrity, availability, threat, vulnerability and risk.<\/li>\r\n \t<li>Acquire skills regarding applications of information security risk assessment on a given scenario for mitigating a threat and the implementation of security policies.<\/li>\r\n \t<li>Develop communication skills regarding communicating the results of a technical risk assessment analysis to the executive business team (CEO, CIO, CFO, COO).<\/li>\r\n \t<li>Understand notions underpinning digital infrastructures from a security point of view; authentication, fingerprinting, backup, passwords, security policies.<\/li>\r\n \t<li>Understand technical cryptographic primitives\r\nand how they are combined to secure an\r\nIT infrastructure; hash functions, encryption\r\nalgorithms, digital signatures,\r\nmessage authentication codes, PKI.<\/li>\r\n \t<li>Understanding the human-computer interaction and\r\nits implications to today\u2019s security.<\/li>\r\n \t<li>Develop the appropriate knowledge and build\r\nsufficient skills to provide leadership in the implementation\r\nof an Information Security Management\r\nSystem (ISMS) in an enterprise organization.<\/li>\r\n<\/ul>"],"_c_learning_outcomes_description":["field_63f607f99bd77"],"c_mode_of_delivery":["Mode of Delivery"],"_c_mode_of_delivery":["field_6447c76184617"],"c_prerequisites":["None"],"_c_prerequisites":["field_6447c76c84618"],"c_course_content":["<ol>\r\n \t<li>Introduction to the fundamental security principles; confidentiality, integrity and availability<\/li>\r\n \t<li>Risk Analysis: Identification of assets, threats, vulnerabilities and suggestions of countermeasures for mitigation<\/li>\r\n \t<li>The threat landscape: social engineering, phishing attack, malware, Trojan horses and DDos attacks<\/li>\r\n \t<li>Security Design: Open Standards or Security through Obscurity?<\/li>\r\n \t<li>Cryptographic Primitives as used for data protection: encryption (block ciphers, stream ciphers, modes of operation), hashing (hash functions), digital signatures, PKI, Message Authentication Codes<\/li>\r\n \t<li>Means of Authentication and their security\/privacy implications: passwords, biometrics, OTP, hardware tokens and memorable information<\/li>\r\n \t<li>Human-Computer Interaction: Theory behind passwords, the art of social engineering and the notion of the weakest link<\/li>\r\n \t<li>Information Security Management System (ISMS) Implementation: Introduction to ISO\/IEC 27001 standard<\/li>\r\n<\/ol>"],"_c_course_content":["field_63f608209bd78"],"c_truefalse":["0"],"_c_truefalse":["field_6447c80f84619"],"c_readings_0_c_readings_1st_row":["<strong>Required Reading:<\/strong>\r\n\r\n1. Charles P. Pfleeger, Shari Lawrence Pfleeger and Jonathan Marguilies. Security in Computing. Prentice Hall (5th Edition), 2015.\r\n\r\n<strong>Recommended Reading:<\/strong>\r\n\r\n<strong>Textbooks<\/strong>\r\n\r\n2. Bruce Schneier. Applied Cryptography: Protocols, Algorithms and Source Code in C. Wiley (2015 Special Edition), 2015.\r\n\r\n3. Ross J. Anderson. Security Engineering: A Guide to Building Dependable Distributed Systems. Wiley (2nd Edition), 2008."],"_c_readings_0_c_readings_1st_row":["field_6447d03051789"],"c_readings_0_c_readings_2st_row":["<strong>Research Articles<\/strong>\r\n\r\n4. Stefan Bauer, Edward Bernroider and Katharina Chudzikowski. Prevention is better than cure! Designing information security awareness programs to overcome users\u2019 non-compliance with information security policies in banks. Computers &amp; Security, Jul2017, Vol. 68, p145-159, 2017.\r\n\r\n5. Yan Chen, K. Ramamurth and Kuang-Wei Wen. Organizations\u2019 Information Security Policy Compliance. Stick or Carrot Approach. Journal of Management Information Systems, Vol 29(3), 2012.\r\n\r\n6. Adel Yazdanmehr and Jingguo Wang. Employees\u2019 Information Security Policy Compliance: A norm activation Perspective. Decision Support Systems Vol 92, 2016.\r\n\r\n&nbsp;"],"_c_readings_0_c_readings_2st_row":["field_6447d0425178a"],"c_readings":["1"],"_c_readings":["field_6447d00351788"],"_seopress_redirections_type":["301"],"_seopress_redirections_logged_status":["both"],"site-sidebar-layout":["default"],"site-content-layout":["default"],"theme-transparent-header-meta":["default"],"_seopress_analysis_target_kw":[""],"_eael_post_view_count":["1780"],"classic-editor-remember":["classic-editor"],"_wp_page_template":["default"],"English_Course":["a:1:{i:0;s:7:\"English\";}"],"_English_Course":["field_664a7ab2b54a8"],"greek_course":[""],"_greek_course":["field_664afc80bfc9b"],"yesno":["1"],"_yesno":["field_6648f406b6def"],"core_en_and_gr":["Core Course"],"_core_en_and_gr":["field_664c54e2559a3"],"Teacher\u2019s_name":["#"],"_Teacher\u2019s_name":["field_6647979a4a918"],"Course_Unit_Objectives_new":["#"],"_Course_Unit_Objectives_new":["field_664c5c2365623"],"Learning_Outcomes_select":["Learning Outcomes"],"_Learning_Outcomes_select":["field_63f607e69bd76"],"Select_mode_of_delivery_language":["Face to Face"],"_Select_mode_of_delivery_language":["field_66546dc27e3f7"],"select_from_Prerequisites_language":["Prerequisites"],"_select_from_Prerequisites_language":["field_6447c76c84618"],"Prerequisites":["None"],"_Prerequisites":["field_664a8078df416"],"Course_Content":["Course Content"],"_Course_Content":["field_664892bc7a322"],"add_course_content":[""],"_add_course_content":["field_664a842c9b2b8"],"Features":["Course Features"],"_Features":["field_664a88b548af2"],"add_course_feautres":["<strong>Planned learning activities and teaching methods<\/strong>\r\nLectures, group work, lab work, role playing, project-based learning, homework\r\n\r\n<strong>Assessment methods and criteria<\/strong>\r\n10% Class participation\r\n30% Group assignment and presentation\r\n60% In-class examination\r\n\r\n<strong>Language of Instruction<\/strong>\r\nEnglish\r\n\r\n<strong>Work Placement(s)<\/strong>\r\nNot applicable"],"_add_course_feautres":["field_664a89441aacf"],"read_choice_lang":["Readings"],"_read_choice_lang":["field_664a8c0bc9898"],"feature_image_program":[""],"_feature_image_program":["field_668bbb4805cdb"],"return_to_the_program":["<a href=\"https:\/\/www.uol.ac.cy\/en\/program\/mba-program\/\">Return to the program<\/a>"],"_return_to_the_program":["field_668ff14d984ef"],"ast-site-content-layout":["default"],"site-content-style":["default"],"site-sidebar-style":["default"],"astra-migrate-meta-layouts":["set"],"stick-header-meta":["default"],"_uag_css_file_name":["uag-css-6482.css"]},"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false,"trp-custom-language-flag":false},"uagb_author_info":{"display_name":"p.efstathiou@uol.ac.cy","author_link":"https:\/\/www.uol.ac.cy\/el\/author\/"},"uagb_comment_info":0,"uagb_excerpt":null,"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/www.uol.ac.cy\/el\/wp-json\/wp\/v2\/courses\/6482","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.uol.ac.cy\/el\/wp-json\/wp\/v2\/courses"}],"about":[{"href":"https:\/\/www.uol.ac.cy\/el\/wp-json\/wp\/v2\/types\/courses"}],"version-history":[{"count":0,"href":"https:\/\/www.uol.ac.cy\/el\/wp-json\/wp\/v2\/courses\/6482\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.uol.ac.cy\/el\/wp-json\/wp\/v2\/media?parent=6482"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}