IB9HG-15 Cybersecurity in Business
Introductory description
This module introduces cybersecurity within a broader business context. It seeks to outline how various types of organizations (e.g., start-ups, SMEs, and large multinational organizations; public and private; digital natives vs non-digital natives, etc.) design and implement cybersecurity programs in order to protect their digital technologies, data and information systems (IS), and other business assets from a myriad of cyber threats. To this end, we investigate cybersecurity issues from organizational, strategic, behavioural, technical, and regulatory perspectives. The purpose of the module is not to train students to become cyber technology experts, but to teach students, who are to perform various organizational roles (also within cybersecurity), to be aware of and know how to address various cyber security ( as well as privacy) issues in strategic IS context.
Module aims
The module explores the role of people, processes, and technology in cybersecurity. It provides in-depth understanding of various cyber attacks, the motivations behind them, the processes through which these attacks unfold and the responses, which an organization can adopt to defend itself. The module also provides insights into how an organization can effectively build and implement a cybersecurity program, which includes aspects such as the identification of relevant cyber risks, building appropriate technology and procedural controls, and raising awareness among relevant stakeholders (employees, users, suppliers) by promoting dedicated cyber culture and providing ongoing training. We will also investigate issues related to the alignment of the cybersecurity program with an organisation's business strategy, employee compliance to an organization's cybersecurity program as well as the program's compliance to existing regulation.
The module deals with topics such as cyber attack types, attacks anatomy, (active) cyber defence (controls), incident response management, cyber organizational readiness and cyber resilience, cyber risk and threat intelligence, cyber insurance, cyber awareness and training, and cyber regulation. While this is not a technical module, we will provide sufficient understanding of important technical aspects of cybersecurity such as backup recovery, intrusion detection, system monitoring, penetration testing, the use of AI and ML in cyber defence, security-by-design, firewalls, patch management, cryptography, identity and access management, etc.
Throughout the module, we will delve into some of the most prominent cyber attack cases and work with established cybersecurity frameworks, standards, and methodologies.
Outline syllabus
This is an indicative module outline only to give an indication of the sort of topics that may be covered. Actual sessions held may differ.
Whilst the module teaching is not a technical cyber security coding course, it will cover a wide range of subject matter knowledge in this space which is essential to understand the risks and threats of technology. It will also consider social and psychological behavior techniques as well. This will exceed the general cyber security certifications available and use applied business strategy theory with cyber security knowledge in a business context.
We relate the module to leading InfoSec certifications CompTIA Security+, GSEC SANS GIAC Security Essentials, including CISSP Certified information Systems Security Professional, CEH certified ethical hacker, ECSA - EC-Council Certified Security Analyst, CISM Certified Information Security Manager, ISACA Certified Information Security Auditor CISA, (ISC)² Certified Cloud Security Professional CCSP, CRISC Certified in Risk and Information Systems Control. GCHQ Certified Training (GCT)
This module is not part of the GCHQ Degree Certification, or the NCSC certification program.
Learning outcomes
By the end of the module, students should be able to:
- Demonstrate in-depth knowledge of and ability to critically evaluate key cybersecurity concepts (e.g., organizational and security controls, defence in depth, vulnerabilities, incident response, situational awareness, cybersecurity awareness and training), frameworks and standards (e.g., NIST, SANS) and theories (e.g., deterrence theory).
- Demonstrate comprehensive understanding and ability to outline the role and responsibilities of the Chief Information Security Officer (CISO), the cybersecurity team and their interplay with the rest of the organization as well as with external stakeholders (regulators, partners, users, etc.).
- Demonstrate understanding of current and emerging cyber security issues, trends and research from a business a management perspective.
- Demonstrate critical situation analysis in businesses and organizations from a cybersecurity view
- Demonstrate creativity in determining cyber attacks and required defences
- Demonstrate thinking skills in anticipating moves and counter moves of enemies, and the cost and outcome risks
Indicative reading list
- Ioannis Agrafiotis, Jason R C Nurse, Michael Goldsmith, Sadie Creese, David Upton, A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate, Journal of Cybersecurity, Volume 4, Issue 1, 2018.
- Michel Benaroch, Third-party induced cyber incidents—much ado about nothing?, Journal of Cybersecurity, Volume 7, Issue 1, 2021.
- Craig Beaman, Ashley Barkworth, Toluwalope David Akande, Saqib Hakak, Muhammad Khurram Khan, Ransomware: Recent advances, analysis, challenges and future research directions, Computers & Security,Volume 111, 2021,102490, ISSN 0167-4048.
- Baskerville, R., Spagnoletti, P., & Kim, J. (2014). Incident-centered Information Security: Managing a Strategic Balance between Prevention and Response. Information & Management, 51(1), 138-151.
- Ahmad, A., Maynard, S.B., Desouza, K.C., Kotsias, J., Whitty, M., & Baskerville, R.L., (2021). How can Organizations Develop Situation Awareness for Incident Response? A Case Study of Management Practice. Computers & Security. Vol 101. (pp. 1-15).
- Information security management principles by Andy Taylor; David Alexander; Amanda Finch; David Sutton, 2020
- How Organizations Can Ramp Up Their Cybersecurity Efforts Right Now in Harvard business review. Article by Brenda R. Sharton, May 2020
- Companies Need to Rethink What Cybersecurity Leadership Is in Harvard business review. Article by Matthew Doan, November 2019
- Why cybersecurity isn’t only a tech problem. Podcast: https://hbr.org/podcast/2019/12/why-cybersecurity-isnt-only-a-tech-problem
- National Cyber Security Center (2021) Annual Review Report - https://www.ncsc.gov.uk/files/NCSC%20Annual%20Review%202021.pdf
- UK National Cyber Security Strategy 2022 - https://www.gov.uk/government/publications/national-cyber-strategy-2022/national-cyber-security-strategy-2022
- NIST, Computer Security Incident Handling Guide. Can be found at: https://nvlpubs.nist.gov/nistpubs/specialpublications/nist.sp.800-61r2.pdf
- Azmi, R., Tibben, W. and Win, K.T., 2018. Review of cybersecurity frameworks: context and shared concepts. Journal of cyber policy, 3(2), pp.258-283.
- He, W. and Zhang, Z., 2019. Enterprise cybersecurity training and awareness programs: Recommendations for success. Journal of Organizational Computing and Electronic Commerce, 29(4), pp.249-257.
- Ahmad, A., Desouza, K. C., Maynard, S. B., Naseer, H., & Baskerville, R. L. (2020). How integration of cyber security management and incident response enables organizational learning. Journal of the Association for Information Science and Technology, 71(8), 939-953.
- Li, L., He, W., Xu, L., Ash, I., Anwar, M. and Yuan, X., 2019. Investigating the impact of cybersecurity policy awareness on employees’ cybersecurity behavior. International Journal of Information Management, 45, pp.13-24.
- Trang, S. and Brendel, B., 2019. A meta-analysis of deterrence theory in information security policy compliance research. Information Systems Frontiers, 21(6), pp.1265-1284.
- Cram, W.A., D'arcy, J. and Proudfoot, J.G., 2019. Seeing the forest and the trees: a meta-analysis of the antecedents to information security policy compliance. MIS Quarterly, 43(2), pp.525-554.
- Donalds, C. and Osei-Bryson, K.M., 2020. Cybersecurity compliance behavior: Exploring the influences of individual decision style and other antecedents. International Journal of Information Management, 51, p.102056.
- Sasha Romanosky, Lillian Ablon, Andreas Kuehn, Therese Jones, Content analysis of cyber insurance policies: how do carriers price cyber risk?, Journal of Cybersecurity, Volume 5, Issue 1, 2019.
- Kabanov, Ilya and Madnick, Stuart (2021) "Applying the Lessons from the Equifax Cybersecurity Incident to Build a Better Defense," MIS Quarterly Executive: Vol. 20 : Iss. 2 , Article 4. Available at: https://aisel.aisnet.org/misqe/vol20/iss2/4
- Jenkins, Jeffrey; Durcikova, Alexandra; and Nunamaker, Jr., Jay F. (2021) "Mitigating the Security Intention-Behavior Gap: The Moderating Role of Required Effort on the Intention-Behavior Relationship," Journal of the Association for Information Systems, 22(1). DOI: 10.17705/1jais.00660 Available at: https://aisel.aisnet.org/jais/vol22/iss1/1
- Sizing Up Your Cyberrisks. Parenty, Thomas J.;Domet, Jack J., Periodical | Harvard Business Review. Nov/Dec2019, Vol. 97 Issue 6.
Interdisciplinary
The module explores cyber security and attacks from different perspectives of hackers, criminal, political, industrial and regulatory perspectives.
Subject specific skills
Design, implement and asses a comprehensive cybersecurity program for an organization (including incident response plan, business continuity plan).
Design and evaluate organizational and security controls.
Exhibit ability to perform key analyses (e.g., threat and risk assessments; identify mid-term and long-term impacts of cyber-attacks on organizations and strategies for mitigating these impacts; apply key cybersecurity frameworks and principles) and critically evaluate findings.
Transferable skills
Written skills.
Teamwork.
Study time
Type | Required |
---|---|
Other activity | 30 hours (20%) |
Private study | 48 hours (32%) |
Assessment | 72 hours (48%) |
Total | 150 hours |
Private study description
Self study to include pre-reading for lectures
Other activity description
This module will be split as two hours face-to-face workshops and one online lecture hour per week. The lecture hour may be live, or may be prerecorded, or as asynchronous tasks with either online or face-to-face support
Costs
No further costs have been identified for this module.
You do not need to pass all assessment components to pass the module.
Assessment group A2
Weighting | Study time | Eligible for self-certification | |
---|---|---|---|
Assessment component |
|||
Group Presentation Slides | 20% | 14 hours | No |
16 slides maximum |
|||
Reassessment component |
|||
Individual assignment | Yes (extension) | ||
Assessment component |
|||
Individual assignment | 80% | 58 hours | Yes (extension) |
Reassessment component is the same |
Feedback on assessment
Feedback via My.WBS
Courses
This module is Optional for:
- Year 1 of TIBS-G5N4 Postgraduate Taught Management of Information Systems and Digital Innovation