course-details-portlet

IMT4127 - Security Management Metrics

About

New from the academic year 2016/2017

Examination arrangement

Examination arrangement: Project word and Assignment
Grade: Letters

Evaluation Weighting Duration Grade deviation Examination aids
Papers 6/10
Three multiople choice examinations 4/10

Course content

A) Requirements- Corporate and IT Governance (2 Lectures)- Internal Control System (2 Lectures)- Transparency, Ownership and Control in Information and Cybersecurity (1 Lecture)- Security Governance and Investment Management (2 Lectures)- Exercise on Requirements (2 Lectures)B) Measuring and Assessing- Maturity Models (2 Lectures)- Audit (2 Lectures)- Compliance (1 Lecture)- Risk Management and IT-Risk Management (2 Lectures)- 2 Exercises on these topics (2 Lectures)C) Standards and Best Practices- COSO (1 Lecture)- COBIT (1 Lecture)- ISO 27001 (ISMS) / ISO 27002 (Controls) (3 Lectures)- ISO 270xx / Cloud Security Alliance Guidelines (1 Lecture)- ISO 22301 (Business Continuity, Disaster Recovery and Crisis Management) (2 Lectures)- Awareness Measures (1 Lecture)- 3 Exercises on these topics (2 Lectures)

Learning outcome

However, IT Governance does not exist "per se", but is based on IT and operational risk management methods, definition and measurement of security measurement metrics, and the subsequent design, implementation and operation of an appropriate level of organizational and technical information security.

 

This course provides an overview of IT and Security Governance, IT Risk Management, Business Continuity Management and Information Security and their dependencies in general, and the information security standards ISO 27001 / ISO 27002 in particular.

 

Knowledge:

After attending the course, candidates should possess the following knowledge:

- security management as an important input to IT and corporate risk management and as a continuous improvement process as well as investment area

- the basic concepts of COSO, Cobit and the ISO 27001 / ISO 27002 / ISO 22301 standard

- a basic understanding of design, implementation and evaluation of maturity models for security

 

Skills:

After attending the course, candidates should possess the following skills:

 

- master the principles for designing, implementing and auditing ISO 27001-based Information security management system (ISMS) , using both organizational and technical building blocks

 

- be able to design an appropriate level of IT Risk Management and Information Security for a given organisational context and express this in terms of an appropriate maturity model

 

General competence:

After attending the course, candidates should possess the following general competence:

 

- main principles, functions and dependencies of IT Governance, ROSI calculation, IT Risk Management, Business Continuity Management/IT Disaster Recovery and Information Security

Learning methods and activities

Forelesninger|Oppgaveløsning|Prosjektarbeid

 

Utfyllende informasjon:

The course will be made accessible for both campus and remote students. Every student is free to choose the pedagogic arrangement form that is best fitted for her/his own requirement. The lectures in the course will be given on campus and are open for both categories of students. All the lectures will also be available on Internet through GUC¿s learning management system (Fronter) or directly provided via streaming (dependent on availability of class rooms with such availabilities). Lectures, exercises and homework in between lecture blocks.

 

Obligatoriske arbeidskrav:

The course requires active participation in projects - both in class and outside class.

Further on evaluation

Utfyllende om kontinuasjon:

The next time the course is running.

 

Vurderingsformer:

Mappeevaluering¿ based on three multiple choice examinations (each 13.3 %, altogether 40 %) and paper writing for each of the parts A, B and C (20% each, total 60%). All elements need to be passed. In specific circumstances, the course responsible can slightly adjust the limits in the conversion table to enforce compatibility with the qualitative descriptions on the A-F scale.

Specific conditions

Admission to a programme of study is required:
Information Security (MIS)
Information Security (MISD)

Course materials

Books/standards, conference/journal papers and web resources, such as:Alan Calder & Steve Watkins. IT Governance : IT Governance: A Manager's Guide to Data Security and ISO 27001 / ISO 27002. Fourth Edition. Kogan Page. 2008.Control Objectives for Information and Related Technology (CObIT) 5, Professional Guides: information security (2012) and assurance (2013), ITGI.Committee of Sponsoring Organizations of the Treadwy Commission, Enterprise Risk Management - Integrated Framework, 2015.Katsikas, Sokratis; Gritzalis, Dimitris, eds. (1996). Information Systems Security: Facing the Information Society of the 21st Century. IFIP Advances in Information and Communication Technology. Springer. p. 358. ISBN 9780412781209.Peter L. Bernstein, "Against the Gods - the Remarkable Story of Risk", John Wiley & Sons, ISBN 0-471-29563-9 ,Paperback, 1998

Credit reductions

Course code Reduction From To
IMT4571 2.5
IMT4651 2.5
IMT4661 2.5
More on the course

No

Facts

Version: 1
Credits:  7.5 SP
Study level: Second degree level

Coursework

Term no.: 1
Teaching semester:  SPRING 2017

Language of instruction: English

-

Subject area(s)
  • Information Security
Contact information
Course coordinator:
  • Laura Georg Schaffner

Department with academic responsibility
Department of Information Security and Communication Technology

Examination

Examination arrangement: Project word and Assignment

Term Status code Evaluation Weighting Examination aids Date Time Examination system Room *
Spring ORD Three multiople choice examinations 4/10

Submission
2017-06-01

Room Building Number of candidates
Spring ORD Papers 6/10

Submission
2017-06-01

Room Building Number of candidates
  • * The location (room) for a written examination is published 3 days before examination date. If more than one room is listed, you will find your room at Studentweb.
Examination

For more information regarding registration for examination and examination procedures, see "Innsida - Exams"

More on examinations at NTNU