Skip to main content Skip to navigation

WM244-18 Information Security Management

Department
WMG
Level
Undergraduate Level 2
Module leader
Olga Angelopoulou
Credit value
18
Module duration
30 weeks
Assessment
Multiple
Study location
University of Warwick main campus, Coventry

Introductory description

All organisations have information that they value and that value needs protecting. Within an organisation, some individuals carry formal responsibility for protecting the value of information. Ensuring that the responsible persons within an organisation have appropriate confidence in the security measures, which are protecting the organisation's valuable information, is the realm of information security management.

Why the organisation might value the information will vary from organisation to organisation and from information point to information point. The properties of the information that give it value similarly will vary by organisation and by information point. Some information will be special secret knowledge that gives the organisation competitive advantage; if that information leaks to a competitor, then its value is reduced. Some information may control the organisation's processes; if this controlling information is changed, then its value may be reduced since it causes the organisation to behave less well. Some information may relate to external perception of the organisation's ability to function; if external parties perceive this publicity information is not under the control of the organisation, then future opportunities for the organisation may be degraded through loss of trust.

Determining the relationship between the properties of information that give it value, the vulnerability of those properties to degradation, threats that might take advantage of the vulnerability to degradation, and the resultant impact to the organisation when bad things happen, is the realm of information risk management. Things can be done to reduce the vulnerability, the threat, or the severity of the impact. These things enhance information security.

Information security management should give those with responsibility for information security, the confidence that things protecting information security are doing what they should. It is about having the strategy, policy, processes, behaviours, and technology, in place and coherently supporting each other.

Module aims

1 - Adopt a responsible attitude to the social, ethical, legal and regulatory consequences that flow from professional engagement in security management.
2 - Evaluate the overall coherence of an organisation's management of cyber security, recommending remediation where needed.

Outline syllabus

This is an indicative module outline only to give an indication of the sort of topics that may be covered. Actual sessions held may differ.

Outline content
The content of this module will be taught from a cyber security perspective.

Policy, Strategy, Awareness and Audit

Legal & Regulatory Environment

Learning outcomes

By the end of the module, students should be able to:

  • 1 - Adopt a responsible attitude to the social, ethical, legal and regulatory consequences that flow from professional engagement in security management.
  • 2 - Evaluate the overall coherence of an organisation's management of cyber security, recommending remediation where needed.

Indicative reading list

Campbell, Tony, “Practical Information Security Management: A Complete Guide to Planning and Implementation”, Apress (2016)

Landoll, Douglas J., “Information Security Policies, Procedures, and Standards”, Auerbach Publications (2016)

Yar, Majid, “Cybercrime and Society”, 2 Ed, Sage Publications Ltd. (2013)

Subject specific skills

1 - Adopt a responsible attitude to the social, ethical, legal and regulatory consequences that flow from professional engagement in security management.
2 - Evaluate the overall coherence of an organisation's management of cyber security, recommending remediation where needed.

Transferable skills

Organisational awareness

Study time

Type Required
Supervised practical classes 18 sessions of 2 hours 30 minutes (25%)
Private study 45 hours (25%)
Assessment 90 hours (50%)
Total 180 hours

Private study description

Independent activity between workshops, following up on activities initiated in previous workshops or preparing for upcoming workshops.

Costs

No further costs have been identified for this module.

You do not need to pass all assessment components to pass the module.

Assessment group A2
Weighting Study time Eligible for self-certification
Assignment 1 50% 45 hours Yes (extension)
Assignment 2 50% 45 hours Yes (extension)
Assessment group R
Weighting Study time Eligible for self-certification
Resubmission assignment 100% Yes (extension)
Feedback on assessment

Written feedback for each assignment
Verbal feedback during tutorial sessions
Summative feedback on assignments

Courses

This module is Core for:

  • Year 2 of UWMA-H651 Undergraduate Cyber Security