Cyber Security Policy and Governance

  • Cybersecurity |

Description

This course gives overview for various aspects for cyber-security policy development, governance structures, policy selection and implementation, auditing, and control mechanisms to assure compliance and efficacy. In addition, the students will learn about various legal considerations involved in formulating and managing such policies, cybercrime, intellectual property, cyberwarfare, and the homeland security (i.e., critical infrastructure protection). They will also be exposed to various technical issues that can be utilized in developing effective national and international policies related to cyberspace. It covers how to analyze policies thoroughly, identify their weaknesses, then compare and contrast them, and recognize the significance of training and compliance in information security risk management. The course highlights the transdisciplinary impacts and issues that must be addressed in designing or putting into practice successful national cybersecurity laws and policies.

Program

Undergraduate 132 CRs

Objectives

  • - Provides knowledge on the history of cyber security policy, the governance frameworks for policy making, the selection and application of policy, and the audit and control procedures to assure compliance and effectiveness.
    - Students will be exposed to the national and international policy and legal considerations related to cybersecurity and cyberspace such as privacy, intellectual property, cybercrime, homeland security (i.e., critical infrastructure protection) and cyberwarfare, and the organizations involved in the formulation of such policies.
    - Analyze policies thoroughly, identify their weaknesses, then compare and contrast them.
    - Recognize the significance of training and compliance in information security risk management.
    - To highlight the transdisciplinary impacts and issues that must be addressed in designing or putting it into practice successful national cybersecurity laws and policies, broader technology issues are also explored.

Textbook

Krag Brotby, Information Security Governance: A Practical Development and Implementation Approach, Wiley
Trim, Peter and Yang-Im Lee, Cyber Security Management: A Governance, Risk and Compliance Framework, Routledge

Course Content

content serial Description
1Course Aim, Course outline, and governance overview
2Security Governance and Regulation
3Cybersecurity and the GDPR
4Risk management and information security outcomes
5The SABSA framework and methodology
67th week Assessment
7Know about COBIT management framework
8Know ISO/IEC 27001/ 27002
9What is risk management?
10Developing a security strategy
1112th week Assessment
12What is bitcoin and its usage, and why they are volatile
13Using CMM for strategy development
14Incident management and response metrics
15A case study including a sample strategy development

Markets and Career

  • Generation, transmission, distribution and utilization of electrical power for public and private sectors to secure both continuous and emergency demands.
  • Electrical power feeding for civil and military marine and aviation utilities.
  • Electrical works in construction engineering.

Start your application

Start The your journey to your new career.