course-details-portlet

IMT4127

Security Management Metrics

New from the academic year 2016/2017

Credits 7.5
Level Second degree level
Course start Spring 2017
Duration 1 semester
Language of instruction English
Examination arrangement Project word and Assignment

About

About the course

Course content

A) Requirements- Corporate and IT Governance (2 Lectures)- Internal Control System (2 Lectures)- Transparency, Ownership and Control in Information and Cybersecurity (1 Lecture)- Security Governance and Investment Management (2 Lectures)- Exercise on Requirements (2 Lectures)B) Measuring and Assessing- Maturity Models (2 Lectures)- Audit (2 Lectures)- Compliance (1 Lecture)- Risk Management and IT-Risk Management (2 Lectures)- 2 Exercises on these topics (2 Lectures)C) Standards and Best Practices- COSO (1 Lecture)- COBIT (1 Lecture)- ISO 27001 (ISMS) / ISO 27002 (Controls) (3 Lectures)- ISO 270xx / Cloud Security Alliance Guidelines (1 Lecture)- ISO 22301 (Business Continuity, Disaster Recovery and Crisis Management) (2 Lectures)- Awareness Measures (1 Lecture)- 3 Exercises on these topics (2 Lectures)

Learning outcome

However, IT Governance does not exist "per se", but is based on IT and operational risk management methods, definition and measurement of security measurement metrics, and the subsequent design, implementation and operation of an appropriate level of organizational and technical information security.

 

This course provides an overview of IT and Security Governance, IT Risk Management, Business Continuity Management and Information Security and their dependencies in general, and the information security standards ISO 27001 / ISO 27002 in particular.

 

Knowledge:

After attending the course, candidates should possess the following knowledge:

- security management as an important input to IT and corporate risk management and as a continuous improvement process as well as investment area

- the basic concepts of COSO, Cobit and the ISO 27001 / ISO 27002 / ISO 22301 standard

- a basic understanding of design, implementation and evaluation of maturity models for security

 

Skills:

After attending the course, candidates should possess the following skills:

 

- master the principles for designing, implementing and auditing ISO 27001-based Information security management system (ISMS) , using both organizational and technical building blocks

 

- be able to design an appropriate level of IT Risk Management and Information Security for a given organisational context and express this in terms of an appropriate maturity model

 

General competence:

After attending the course, candidates should possess the following general competence:

 

- main principles, functions and dependencies of IT Governance, ROSI calculation, IT Risk Management, Business Continuity Management/IT Disaster Recovery and Information Security

Learning methods and activities

Forelesninger|Oppgaveløsning|Prosjektarbeid

 

Utfyllende informasjon:

The course will be made accessible for both campus and remote students. Every student is free to choose the pedagogic arrangement form that is best fitted for her/his own requirement. The lectures in the course will be given on campus and are open for both categories of students. All the lectures will also be available on Internet through GUC¿s learning management system (Fronter) or directly provided via streaming (dependent on availability of class rooms with such availabilities). Lectures, exercises and homework in between lecture blocks.

 

Obligatoriske arbeidskrav:

The course requires active participation in projects - both in class and outside class.

Further on evaluation

Utfyllende om kontinuasjon:

The next time the course is running.

 

Vurderingsformer:

Mappeevaluering¿ based on three multiple choice examinations (each 13.3 %, altogether 40 %) and paper writing for each of the parts A, B and C (20% each, total 60%). All elements need to be passed. In specific circumstances, the course responsible can slightly adjust the limits in the conversion table to enforce compatibility with the qualitative descriptions on the A-F scale.

Specific conditions

Admission to a programme of study is required:
Information Security (MIS)
Information Security (MISD)

Course materials

Books/standards, conference/journal papers and web resources, such as:Alan Calder & Steve Watkins. IT Governance : IT Governance: A Manager's Guide to Data Security and ISO 27001 / ISO 27002. Fourth Edition. Kogan Page. 2008.Control Objectives for Information and Related Technology (CObIT) 5, Professional Guides: information security (2012) and assurance (2013), ITGI.Committee of Sponsoring Organizations of the Treadwy Commission, Enterprise Risk Management - Integrated Framework, 2015.Katsikas, Sokratis; Gritzalis, Dimitris, eds. (1996). Information Systems Security: Facing the Information Society of the 21st Century. IFIP Advances in Information and Communication Technology. Springer. p. 358. ISBN 9780412781209.Peter L. Bernstein, "Against the Gods - the Remarkable Story of Risk", John Wiley & Sons, ISBN 0-471-29563-9 ,Paperback, 1998

Credit reductions

Course code Reduction From
IMT4571 2.5 sp
IMT4651 2.5 sp
IMT4661 2.5 sp
This course has academic overlap with the courses in the table above. If you take overlapping courses, you will receive a credit reduction in the course where you have the lowest grade. If the grades are the same, the reduction will be applied to the course completed most recently.

Subject areas

  • Information Security

Contact information

Course coordinator

  • Laura Georg Schaffner

Department with academic responsibility

Department of Information Security and Communication Technology

Examination

Examination

Examination arrangement: Project word and Assignment
Grade: Letters

Ordinary examination - Spring 2017

Three multiople choice examinations
Weighting 4/10 Date Submission 2017-06-01
Papers
Weighting 6/10 Date Submission 2017-06-01