Security Management in Cyber Domain (5 cr)
Code: YTCP0100-3005
General information
Enrollment
01.08.2023 - 08.09.2023
Timing
28.08.2023 - 19.12.2023
Number of ECTS credits allocated
5 op
Mode of delivery
Face-to-face
Unit
School of Technology
Teaching languages
- English
Seats
20 - 35
Degree programmes
- Master's Degree Programme in Information Technology, Cyber Security
Teachers
- Jari Hautamäki
- Karo Saharinen
Groups
-
YTC23S1Master of Engineering, Degree Programme in Cyber Security
- 15.12.2023 15:00 - 20:00, Security Management in Cyber Domain YTCP0100-3005
- 16.12.2023 09:00 - 15:00, Security Management in Cyber Domain YTCP0100-3005
Objectives
The student understands terminology and principles of cyber security and he (she) knows most of important models used in cyber security management.
Course competences
EUR-ACE: Knowledge and Understanding, Master's Degree
EUR-ACE: Engineering Analysis, Master's Degree
EUR-ACE: Lifelong Learning, Master's Degree
Content
The key topics of the course are:
- Terminology in cyber domain (of Cyber security)
- Threat actors / vectors
- Cybersecurity strategy
- Security management
- Continuous Security Improvement
- Risk management
- Continuity management
- Security management models
- Information Security Management Processes and Phases
- Legislation
Time and location
Contact lessons:
9/23 , 10/23, 11/23 and 12/23
Location:
Piippukatu 2, Jyväskylä
Room:
D505 (Koivuluokka)
Learning materials and recommended literature
Managing risk in information systems
* eBook Collection (EBSCO). Database Interface Luettavissa JAMK:n käyttäjätunnuksilla = Access restricted to the JAMK user account
* E-book
* Authors: Gibson, Darril, ; Igonor, Andy
* Jones & Bartlett Learning 2020. Third edition
Cyber Security Management: A Governance, Risk and Compliance Framework
* Authors: Peter Trim and Yang-Im Lee
* TAYLOR AND FRANCIS © 2016
* ISBN:9781317155263
* By simplifying complex material, this book provides a multi-disciplinary perspective, and an explanation and interpretation of how managers can manage cyber threats in a proactive manner and work towards counteracting cyber threats both now and in the future.
Cyber Security : analytics, technology and automation
* Electronic publication
* Authors: Lehto, Martti; Neittaanmäki, Pekka
* Springer 2015.
* Over the last two decades, the Internet and more broadly cyberspace has had a tremendous impact on all parts of society. Governments across the world have started to develop cyber security strategies and to consider cyberspace as an increasingly important international issue. The book, in addition to the cyber threats and technology, processes cyber security from many sides as a social phenomenon and how the implementation of the cyber security strategy is carried out. The book gives a profound idea of the most spoken phenomenon of this time. The book is suitable for a wide-ranging audience from graduate to professionals/practitioners and researchers. Relevant disciplines for the book are: Telecommunications / Network security, Applied mathematics / Data analysis, Mobile systems / Security, Engineering / Security of critical infrastructure and Military science.
Teaching methods
Contact lessons one time per month (Friday-Saturday)
Remote studies
* Home assignments
CSM exercise
* Seminar
Student workload
Workload per students 135 hour
Evaluation scale
0-5
Evaluation criteria, satisfactory (1-2)
Sufficient 1: The student demonstrates sufficient mastery of the theory on management of cyber security and is able to analyse existing state of enterprises cyber security. The student have sufficient understand of enterprises threats and risks that are formulated related to context. The student is able to design cyber security management system based on given requirement definition. The student reflects on his (her) own learning sufficiently.
Satisfactory 2: The student demonstrates satisfactory mastery of the theory on management of cyber security and is able to analyse existing state of enterprises cyber security. The student have satisfactory understand of enterprises threats and risks that are formulated related to context. The student is able to design a satisfactory cyber security management system based on given requirement definition. The student reflects on his (her) own learning satisfactorily.
Evaluation criteria, good (3-4)
Good 3: The student demonstrates good mastery of the theory on management of cyber security and is able to analyze existing state of enterprises cyber security. The student has good understand of enterprises threats and risks that are formulated related to context. The student is able to design a good cyber security management system based on given requirement definition. The student reflects on his (her) own learning well.
Very good 4: The student demonstrates very good mastery of the theory on management of cyber security and is able to analyze existing state of enterprises cyber security. The student has very good understand of enterprises threats and risks that are formulated related to context. The student is able to design a very good cyber security management system based on given requirement definition. The student reflects on his (her) own learning very well.
Evaluation criteria, excellent (5)
Excellent 5: The student demonstrates excellent mastery of the theory on management of cyber security and is able to analyse existing state of enterprises cyber security in a versatile manner. The student understands excellently enterprises threats and risks that are formulated related to context. The student is able to design an excellent cyber security management system based on given requirement definition. The student reflects on his (her) own learning commendably.
Prerequisites
-