Skip to main content

Security Management in Cyber Domain (5 cr)

Code: YTCP0100-3004

General information


Enrollment

01.08.2022 - 04.09.2022

Timing

29.08.2022 - 16.12.2022

Number of ECTS credits allocated

5 op

Mode of delivery

Face-to-face

Unit

School of Technology

Campus

Lutakko Campus

Teaching languages

  • English

Seats

0 - 35

Degree programmes

  • Master's Degree Programme in Information Technology, Cyber Security

Teachers

  • Jari Hautamäki

Objectives

The student understands terminology and principles of cyber security and he (she) knows most of important models used in cyber security management.

Course competences
EUR-ACE: Knowledge and Understanding, Master's Degree
EUR-ACE: Engineering Analysis, Master's Degree
EUR-ACE: Lifelong Learning, Master's Degree

Content

The key topics of the course are:
- Terminology in cyber domain (of Cyber security)
- Threat actors / vectors
- Cybersecurity strategy
- Security management
- Continuous Security Improvement
- Risk management
- Continuity management
- Security management models
- Information Security Management Processes and Phases
- Legislation

Time and location

Contact lessons:
9/21 , 10/21, 11/21 and 12/21
Location:
Piippukatu 2, Jyväskylä
Room:
D504 (Koivuluokka)

Learning materials and recommended literature

Cyber Security Management: A Governance, Risk and Compliance Framework
* Peter Trim and Yang-Im Lee
* Gower Publishing Limited © 2014 (263 pages)
* ISBN:9781472432094
* By simplifying complex material, this book provides a multi-disciplinary perspective, and an explanation and interpretation of how managers can manage cyber threats in a proactive manner and work towards counteracting cyber threats both now and in the future.

Cyber Security : analytics, technology and automation
* Electronic publication
* Lehto, Martti, toimittaja. ; Neittaanmäki, Pekka, toimittaja.
* Springer 2015.
* Over the last two decades, the Internet and more broadly cyberspace has had a tremendous impact on all parts of society. Governments across the world have started to develop cyber security strategies and to consider cyberspace as an increasingly important international issue. The book, in addition to the cyber threats and technology, processes cyber security from many sides as a social phenomenon and how the implementation of the cyber security strategy is carried out. The book gives a profound idea of the most spoken phenomenon of this time. The book is suitable for a wide-ranging audience from graduate to professionals/practitioners and researchers.

Practical Information Security Management: A Complete Guide to Planning and Implementation
* Books24x7
* https://janet.finna.fi/Record/nelli27_jamk.3710000000965191

Teaching methods

Contact lessons one time per month (Friday-Saturday)
Remote studies
* Home assignments
CSM exercise
* Seminar

Student workload

Workload per students 135 hour

Evaluation scale

0-5

Evaluation criteria, satisfactory (1-2)

Sufficient 1: The student demonstrates sufficient mastery of the theory on management of cyber security and is able to analyse existing state of enterprises cyber security. The student have sufficient understand of enterprises threats and risks that are formulated related to context. The student is able to design cyber security management system based on given requirement definition. The student reflects on his (her) own learning sufficiently.

Satisfactory 2: The student demonstrates satisfactory mastery of the theory on management of cyber security and is able to analyse existing state of enterprises cyber security. The student have satisfactory understand of enterprises threats and risks that are formulated related to context. The student is able to design a satisfactory cyber security management system based on given requirement definition. The student reflects on his (her) own learning satisfactorily.

Evaluation criteria, good (3-4)

Good 3: The student demonstrates good mastery of the theory on management of cyber security and is able to analyze existing state of enterprises cyber security. The student has good understand of enterprises threats and risks that are formulated related to context. The student is able to design a good cyber security management system based on given requirement definition. The student reflects on his (her) own learning well.

Very good 4: The student demonstrates very good mastery of the theory on management of cyber security and is able to analyze existing state of enterprises cyber security. The student has very good understand of enterprises threats and risks that are formulated related to context. The student is able to design a very good cyber security management system based on given requirement definition. The student reflects on his (her) own learning very well.

Evaluation criteria, excellent (5)

Excellent 5: The student demonstrates excellent mastery of the theory on management of cyber security and is able to analyse existing state of enterprises cyber security in a versatile manner. The student understands excellently enterprises threats and risks that are formulated related to context. The student is able to design an excellent cyber security management system based on given requirement definition. The student reflects on his (her) own learning commendably.

Prerequisites

-