English   Danish

2019/2020  KAN-CBUSV2033U  Business Cyber Security: Analyzing and responding to threats in a digital world (B)

English Title
Business Cyber Security: Analyzing and responding to threats in a digital world (B)

Course information

Language English
Course ECTS 7.5 ECTS
Type Elective
Level Full Degree Master
Duration One Semester
Start time of the course Autumn
Timetable Course schedule will be posted at calendar.cbs.dk
Min. participants 30
Max. participants 100
Study board
BUS Study Board for BSc/MSc in Business Administration and Information Systems, MSc
Course coordinator
  • Irfan Kanat - Department of Digitalisation
Main academic disciplines
  • Customer behaviour
  • Information technology
  • Organisation
Teaching methods
  • Face-to-face teaching
Last updated on 04-06-2019

Relevant links

Learning objectives
  • Account for current and future threats to data security
  • Reflect on the efficacy and efficiency of responses and approaches to the management of data security
  • Account for relevant technical concepts that underpin cyber security
  • Suggest balanced and reflective tactics and strategies in response to current or future threat scenarios
  • Reflect on the role of organizational, human, as well as technological aspects of cyber security.
  • Give an account of the mandatory literature and relate the literature to examples of business cyber security
Course prerequisites
None
Prerequisites for registering for the exam (activities during the teaching period)
Number of compulsory activities which must be approved: 2
Compulsory home assignments
Each student has to pass 2 mandatory assignments
There are 3 mandatory essays of 2 pages. Each student has to pass 2 out of 3 activities in order to go to the ordinary exam. There will not be any extra attempts provided to the students before the ordinary exam.
If a student cannot participate due to documented illness, or if a student fails the activity in spite of making a real attempt to pass the activity, then the student will be given one extra attempt before the re-exam. Before the re-exam, there will be one home assignment (10 pages) which will cover 2 mandatory assignments.
Examination
Business Cyber Security: Analyzing and responding to threats in a digital world:
Exam ECTS 7,5
Examination form Home assignment - written product
Individual or group exam Individual exam
Size of written product Max. 10 pages
Assignment type Written assignment
Duration Written product to be submitted on specified date and time.
Grading scale 7-point grading scale
Examiner(s) One internal examiner
Exam period Winter
Make-up exam/re-exam
Same examination form as the ordinary exam
Description of the exam procedure

Hand in assignment based on predetermined questions

Course content, structure and pedagogical approach

It seems hardly a week goes by without hearing about challenges to cyber security, data leaks, breaches or warfare on a digital battleground. As digital data is a ubiquitous and vital resource for almost every form of organization, and as organizational data and resources are increasingly networked and compromised by breaches, leaks, and other incidents, business cyber security is concerned with safeguarding digital resources and information systems. This course introduces students to practical computer security, balancing social/organizational, technical and legal aspects of what is increasingly recognized as an indispensable part of managing information systems and technology infrastructures. The course provides a business and management-oriented view to data security, and students will be presented with a variety of insights into both public and private organizations, and different rationales for the ongoing engagement with data security. Throughout the course, students will be introduced to different types of threats, attacks, their prevalence as well as the types of technical and organizational responses, ethical and juridical aspects of cyber security. The course is intended to expand the students’ vocabulary by focusing on both academic/theoretical concepts and to increase their professional ability to coordinate and communicate about the social, human as well as technical underpinnings of threats to data security.

 

The main learning activity will be class room teaching as well as interactive workshops. 

Description of the teaching methods
Lectures + workshops
Feedback during the teaching period
Feedback based on an ongoing dialogue in class. Online feedback on written mandatory hand-ins. Office hours for follow up feedback to themes covered in the lectures as well as supervision of final assignment.
Student workload
Lectures 24 hours
Workshops 24 hours
Reading/preparation 86 hours
Project writing 72 hours
Expected literature

The literature can be changed before the semester starts. Students are advised to find the final literature on Canvas before they buy any books or other resources.

Last updated on 04-06-2019