Applied Information Security Management
Enrolments for this year have closed. Keep exploring subjects.
QS RANKING 2022
Times Higher Education Ranking 2022
On successful completion of the subject students are expected to:
communicate the importance of security of both resources and data in terms of threat, vulnerability and protection
compare the different types and methods of securing an organisation's data and information technology infrastructure for the best outcome
devise the management of the security aspects of an organisation's IT infrastructure and data resources
evaluate the benefits and weaknesses of different methods of enforcing security, and appropriate methods for securing different types of systems
communicate an awareness of both managerial and legal issues involved in the management of IT security.
- Introduction to the Management of Information Security
- Planning for Security
- Planning for Contingencies
- Information Security Policy
- Developing the Security Program
- Risk Management: Identifying and assessing risks
- Risk Management: Controlling risk
- Security Management Models
- Security Management Practices
- Protection Mechanisms
- Personnel Security
In order to enrol in this subject, you must be accepted into one of the following degrees:
No additional requirements
Information security managers design, build and manage enterprise information security. This unit focuses on enabling students to use the tools of threat and vulnerability assessment, security policy and procedure, and strategic decision making for information security management. Students work in teams within a realistic enterprise environment to develop enterprise security policy to deal with challenges to Information Security.
Please Note: All students studying at Murdoch University will need to complete the compulsory unit, Murdoch Academic Passport (MAP100), which only takes 2-3 hours to complete online. Find out more: http://goto.murdoch.edu.au/MurdochAcademicPassport.
Assessment in this subject reflects the practical need for students to genuinely engage with the information security management concepts being taught, and apply them in realistic scenarios. Feedback is provided during online workshop sessions and marking reports.
- Research Essay (25%)
- Security Master Plan Report (35%)
- Final Online Examination (40%)