BI425 – Information Security Management for Business
Master of Science in Financial Services
Elective Course
BI425 – Information Security Management for Business
Course Unit Code: BI425
Type Of Unit: Core
Level of Course Unit: Second cycle
Year of Study: First/second year
Semester: On demand
Number of ECTS Credits: 6
Class Contact Hours: 28
Mode of Delivery
Face to Face
Prerequisites
None
Course Objectives
The aims of this course is to teach the students the fundamentals behind security engineering principles that underpin today’s cyber world. The course introduces the concepts and issues related to security of systems, data and infrastructures and presents the state-of-art techniques for mitigating cyber threats and ensuring compliance with regulations and policies. The course covers both technical, like cryptographic primitives and security designs, and managerial material that needed to be understood by a leader in an IT organization. Upon completion of this course, students will acquire the necessary understanding and critical thinking for assessing threats based on widely-used risk-assessment methodologies and being in position to lead the implementation of an Information Security Management System (ISMS) in their enterprise or organization.
Learning Outcomes
- Understand fundamental security notions such as confidentiality, integrity, availability, threat, vulnerability and risk.
- Acquire skills regarding applications of information security risk assessment on a given scenario for mitigating a threat and the implementation of security policies.
- Develop communication skills regarding communicating the results of a technical risk assessment analysis to the executive business team (CEO, CIO, CFO, COO).
- Understand notions underpinning digital infrastructures from a security point of view; authentication, fingerprinting, backup, passwords, security policies.
- Understand technical cryptographic primitives and how they are combined to secure an IT infrastructure; hash functions, encryption algorithms, digital signatures, message authentication codes, PKI.
- Understanding the human-computer interaction and its implications to today’s security.
- Develop the appropriate knowledge and build sufficient skills to provide leadership in the the implementation of an Information Security Management System (ISMS) in an enterprise organization.
Course Content
1. Introduction to the fundamental security principles; confidentiality, integrity and availability. CILO 1
2. Risk Analysis: Identification of assets, threats, vulnerabilities and suggestions of countermeasures
for mitigation. CILO 1,2,3
3. The threat landscape: social engineering, phishing attack, malware, Trojan horses and DDos attacks. CILO 2
4. Security Design: Open Standards or Security through
Obscurity? CILO 4,5
5. Cryptographic Primitives as used for data protection: encryption (block ciphers, stream ciphers, modes of
operation), hashing (hash functions), digital signatures, PKI, Message Authentication Codes. CILO 5
6. Means of Authentication and their security/privacy
implications: passwords, biometrics, OTP, hardware tokens and memorable information. CILO 4,5
7. Human-Computer Interaction: Theory behind passwords, the art of social engineering and the
notion of the weakest link. CILO 6
8. Information Security Management System (ISMS) Implementation: Introduction to ISO/IEC 27001 standard CILO 7
Course Features
Planned learning activities and teaching methods
lectures, group work, lab work, role playing, project-based learning, homework
Assessment methods and criteria
10% Class participation
60% Group assignment and presentation: 30% In-class examination
Language of Instruction
English
Work Placement(s)
Not applicable
Readings
Required Reading:
1. Charles P. Pfleeger, Shari Lawrence Pfleeger and Jonathan Marguilies. Security in Computing. Prentice Hall (5th Edition), 2015.
Recommended Reading:
Textbooks
2. Bruce Schneier. Applied Cryptography: Protocols, Algorithms and Source Code in C. Wiley (2015 Special Edition), 2015.
3. Ross J. Anderson. Security Engineering: A Guide to Building Dependable Distributed Systems. Wiley (2nd Edition), 2008.
Research Articles
4. Stefan Bauer, Edward Bernroider and Katharina Chudzikowski. Prevention is better than cure! Designing information security awareness programs to overcome users’ non-compliance with information security policies in banks. Computers & Security, Jul2017, Vol. 68, p145-159, 2017.
5. Yan Chen, K. Ramamurth and Kuang-Wei Wen. Organizations’ Information Security Policy Compliance. Stick or Carrot Approach. Journal of Management Information Systems, Vol 29(3), 2012.
6. Adel Yazdanmehr and Jingguo Wang. Employees’ Information Security Policy Compliance: A norm activation Perspective. Decision Support Systems Vol 92, 2016.