2018/2019 KAN-CCMVI2075U Information Security Management
English Title | |
Information Security Management |
Course information |
|
Language | English |
Course ECTS | 7.5 ECTS |
Type | Elective |
Level | Full Degree Master |
Duration | Summer |
Start time of the course | Summer |
Timetable | Course schedule will be posted at calendar.cbs.dk |
Max. participants | 60 |
Study board |
Study Board for MSc in Economics and Business
Administration
|
Course coordinator | |
|
|
For academic
questions related to the course, please contact the course
instructor.
Other academic questions: contact academic director Sven Bislev at sb.msc@cbs.dk |
|
Main academic disciplines | |
|
|
Teaching methods | |
|
|
Last updated on 29-05-2019 |
Relevant links |
Learning objectives | ||||||||||||||||||||||
To achieve the grade 12, students should meet the
following learning objectives with no or only minor mistakes or
errors:
|
||||||||||||||||||||||
Course prerequisites | ||||||||||||||||||||||
Completed Bachelor degree or equivalent | ||||||||||||||||||||||
Examination | ||||||||||||||||||||||
|
||||||||||||||||||||||
Course content and structure | ||||||||||||||||||||||
This course presents the concepts of information security presented in a systems engineering approach to provide managers with tools and understanding needed to allocate scarce security resources effectively. The course covers an introduction to security attributes and policies, threats, vulnerabilities, and risk managment concepts. A case study of the architecture of an enterprise security sytem is developed to include a needs analysis, levels of protection, detection strategies and correction/recovery with crisis manangement, risk analysis, and business continuity plans.
Preliminary assignment: Identify a company and a recent cybersecurity threat to be discussed in class Class 1:What is Cybersecurity?
Feedback activity: The topic for the home assignment needs to be approved by the instructor. This assignment will be done individually. Class 7: Planning for Security: Incident Response Plans
|
||||||||||||||||||||||
Description of the teaching methods | ||||||||||||||||||||||
Lectures, Case-based teaching, Group discussion | ||||||||||||||||||||||
Feedback during the teaching period | ||||||||||||||||||||||
The students are required to present their
proposal for the home assignment. The topic for the home assignment
needs to be approved by the instructor. This assignment will be
done individually.
All Home Project Assignments/mini projects are based uopn a research question (problem formulation) formulated by the students individually, and must be handend in to the course instructor for his/her approval no later than 11 July 2019. The instruction must approve the research question (problem formulation) no later than 16 July 2019. The approval is a feedback to the student about the instructor's assessment of the problem's relevance and the possibilities of producing a good report. |
||||||||||||||||||||||
Student workload | ||||||||||||||||||||||
|
||||||||||||||||||||||
Further Information | ||||||||||||||||||||||
Preliminary Assignment: To help students get maximum value from ISUP courses, instructors provide a reading or a small number of readings or video clips to be read or viewed before the start of classes with a related task scheduled for class 1 in order to 'jump-start' the learning process.
Course timetable is available on https://www.cbs.dk/uddannelse/international-summer-university-programme-isup/courses-and-exams
We reserve the right to cancel the course if we do not get enough applications. This will be communicated on https://www.cbs.dk/uddannelse/international-summer-university-programme-isup/courses-and-exams end February 2019 at the latest.
|
||||||||||||||||||||||
Expected literature | ||||||||||||||||||||||
Mandatory readings:
Class 1:What is Cybersecurity? Garfinkel, S. (2012). Inside Risks: The Cybersecurity Risk. Communications of the ACM, 55(6), 29-32. doi:10.1145/2184319.2184330 Gault, M. (2015). “The CIA Secret to Cybersecurity That No One Seems to Get,” Wired, accessed https://www.wired.com/2015/12/the-cia-secret-to-cybersecurity-that-no-one-seems-to-get/ Murphy, B., Boren, R., & Schlarman, S. (2000). Enterprise Security Architecture. Information Systems Security, 9(2), 18.
Class 2: Exploiting Threats and Vulnerabilities Esteves, J., Ramalho, E., & De Haro, G. (2017). To Improve Cybersecurity, Think Like a Hacker. MIT Sloan Management Review, 58(3), 71-77. A. Sadeghi et al. , (2017) Vulnerability and Security Risk Assessment of a Thermal Power Plant Using SVA Technique, Journal of Integrated Security Science 2017 (1) 16-28. Carolyn P. Meinel (1998) “How Hackers Break In ... and How They Are Caught,”Scientific American, October 1998.
Robert D. Austin and Chris A. R. Darby (2003) “The Myth of Secure Computing,” Harvard Business Review, June 2003, p. 140.
Class 3: Risk Management Eirik Bjorheim Abrahamsen, Kenneth Pettersen, Terje Aven, Mareile Kaufmann & Tony Rosqvist (2017) A framework for selection of strategy for management of security measures, Journal of Risk Research, 20:3, 404-417, DOI: 10.1080/13669877.2015.1057205 Pettigrew, J. & Ryan, J. (2012). Making Successful Security Decisions: A Qualitative Evaluation., IEEE Computer and Reliability Societies, January-February 2012. Alan D. Smith, William T. Rupp, (2002) "Issues in cybersecurity; understanding the potential risks associated with hackers/crackers", Information Management & Computer Security, Vol. 10 Issue: 4, pp.178-183, https:// doi.org/10.1108/09685220210436976
Class 4: Planning for Security: Information Security Policies Lambrinoudakis, C., et.al., (2003). Security requirements for e-government services: A Methodological Approach for Developing a Common PKI-based Security Policy, Computer Communications, 26, pp., 1873-1883. NIST Policy Templates CERT
Class 5: Planning for Security: Contingency Planning Cerullo, V., & Cerullo, M. J. (2004). Business Continuity Planning: A Comprehensive Approach. Information Systems Management, 21(3), 70-78. Ives, B., & Junglas, I. (2006). Information Systems at Northrop Grumman Ship Systems Sector: The Hurricane Katrina Recovery. Communications of the Association for Information Systems, 18557-577. Devargas, M. (1999). Survival is Not Compulsory: An Introduction to Business Continuity Planning. Computers & Security, 18(1), 35. HBR Case: Austin, R., Leibrock, L., & Murray, A. iPremier (A): Denial of Service Attack (Graphic Novel Version), Harvard Business Review, accessed from https://hbr.org/product/ipremier-co-a-denial-of-service-attack/an/601114-PDF-ENG?Ntt=iPremier
Class 6: Planning for Security: Disaster Recovery Plans Gupta, M., Chaturvedi, A., & Mehta, S. (2011). Economic Analysis of Tradeoffs Between Security and Disaster Recovery. Communications Of The Association For Information Systems, 281-16. Powell, J. L. (1993). Rightsizing the IS department. Information Systems Management, 10(2), 81. Harreld, H., & Fonseca, B. (2001). Guarding against cyberterrorism. Infoworld, 23(43), 34. Feedback activity: In groups, students will apply concepts of cybersecurity to a case and present it to the class.
Class 7: Planning for Security: Incident Response Plans Mitrof, I & Alpaslan, Murat (2003). “Preparing for Evil,” Harvard Business Review, Reddy, H., Venter, H.S. (2013). “The Architecture of a Digital Forensics Readiness Management System,” Computers and Security 32, pp. 73-89. • http://csrc.nist.gov/publications/nistpubs/index.html: o SP 800-12 An Introduction to Computer Security: The NIST Handbook o SP 800-26 Security Self-Assessment Guide for Information Technology Systems o SP 800-30 Risk Management Guide for Information Technology Systems o SP 800-34 Contingency Planning Guide for Information Technology Systems
Class 8:Security Management Models • Handbook of Information Security Management: http://www.ccert.edu.cn/education/cissp/hism/ewtoc.html • International Information Security Management Systems Users Group: http://www.xisec.com/ • Information Technology Security Management Code of Practice: http://www.iso.org/iso/en/prods-services/popstds/informationsecurity.html
Class 9: Protection Mechanisms Barnes, Paul H., Charles, M., Branagan, M., and Alistair, K. (2007). “Intelligence and Anticipation: Issues in Security, Risk and Crisis Management,” International Journal of Risk Assessment & Management 7(8), pp. 1209- 1223. • Activity: Case Study: IBM Zone Trusted Information Channel (ZTIC) URL: http://www.youtube.com/watch?v=mPZrkeHMDJ8 (Discuss Authentication Factors - Authentication factors are classified into three groups: human factors (biometrics, for example, “something you are”), personal factors (“something you know”), and technical factors (“something you have”).
Class 10: Personnel and Controls & Class 11: Developing a Security, Education, Training and Awareness Program Davinson, N & Sillence, E. (2010) “It won’t happen to me: Promoting Secure Behavior Among Internet Users,” Computers in Human Behavior 26 pp 1739-1747. Albrechtsen, E., Houden, J., (2009)., “ The Information Security Digital Divide Between Information Security Managers and Users. Computers & Security 28, pp., 476-490. Additional Cases: Videos: A Conversation with Yvette Smith, Microsoft General Manager for Global Customer Support and Services https://www.youtube.com/watch?v=GY_DPfIqkfU
|