2019/2020 KAN-CBUSV2033U Business Cyber Security: Analyzing and responding to threats in a digital world (B)
English Title | |
Business Cyber Security: Analyzing and responding to threats in a digital world (B) |
Course information |
|
Language | English |
Course ECTS | 7.5 ECTS |
Type | Elective |
Level | Full Degree Master |
Duration | One Semester |
Start time of the course | Autumn |
Timetable | Course schedule will be posted at calendar.cbs.dk |
Min. participants | 30 |
Max. participants | 100 |
Study board |
BUS Study Board for BSc/MSc in Business Administration and
Information Systems, MSc
|
Course coordinator | |
|
|
Main academic disciplines | |
|
|
Teaching methods | |
|
|
Last updated on 04-06-2019 |
Relevant links |
Learning objectives | ||||||||||||||||||||||||
|
||||||||||||||||||||||||
Course prerequisites | ||||||||||||||||||||||||
None | ||||||||||||||||||||||||
Prerequisites for registering for the exam (activities during the teaching period) | ||||||||||||||||||||||||
Number of compulsory
activities which must be approved: 2
Compulsory home
assignments
Each student has to pass 2 mandatory assignments There are 3 mandatory essays of 2 pages. Each student has to pass 2 out of 3 activities in order to go to the ordinary exam. There will not be any extra attempts provided to the students before the ordinary exam. If a student cannot participate due to documented illness, or if a student fails the activity in spite of making a real attempt to pass the activity, then the student will be given one extra attempt before the re-exam. Before the re-exam, there will be one home assignment (10 pages) which will cover 2 mandatory assignments. |
||||||||||||||||||||||||
Examination | ||||||||||||||||||||||||
|
||||||||||||||||||||||||
Course content, structure and pedagogical approach | ||||||||||||||||||||||||
It seems hardly a week goes by without hearing about challenges to cyber security, data leaks, breaches or warfare on a digital battleground. As digital data is a ubiquitous and vital resource for almost every form of organization, and as organizational data and resources are increasingly networked and compromised by breaches, leaks, and other incidents, business cyber security is concerned with safeguarding digital resources and information systems. This course introduces students to practical computer security, balancing social/organizational, technical and legal aspects of what is increasingly recognized as an indispensable part of managing information systems and technology infrastructures. The course provides a business and management-oriented view to data security, and students will be presented with a variety of insights into both public and private organizations, and different rationales for the ongoing engagement with data security. Throughout the course, students will be introduced to different types of threats, attacks, their prevalence as well as the types of technical and organizational responses, ethical and juridical aspects of cyber security. The course is intended to expand the students’ vocabulary by focusing on both academic/theoretical concepts and to increase their professional ability to coordinate and communicate about the social, human as well as technical underpinnings of threats to data security.
The main learning activity will be class room teaching as well as interactive workshops. |
||||||||||||||||||||||||
Description of the teaching methods | ||||||||||||||||||||||||
Lectures + workshops | ||||||||||||||||||||||||
Feedback during the teaching period | ||||||||||||||||||||||||
Feedback based on an ongoing dialogue in class. Online feedback on written mandatory hand-ins. Office hours for follow up feedback to themes covered in the lectures as well as supervision of final assignment. | ||||||||||||||||||||||||
Student workload | ||||||||||||||||||||||||
|
||||||||||||||||||||||||
Expected literature | ||||||||||||||||||||||||
The literature can be changed before the semester starts. Students are advised to find the final literature on Canvas before they buy any books or other resources. |