Last modified: 27 Feb 2023 13:21
The course will discuss the higher-level context for cybersecurity in an organization, specifically through its relation to information governance. Requirements, policies, procedures, processes, and controls for data security will be a central topic. Individual privacy, and data protection of sensitive private data within organizations, will be covered in detail.
Study Type | Postgraduate | Level | 5 |
---|---|---|---|
Term | Second Term | Credit Points | 15 credits (7.5 ECTS credits) |
Campus | Aberdeen | Sustained Study | No |
Co-ordinators |
|
The course will discuss the higher-level context for cybersecurity in an organization, specifically through its relation to information governance. Requirements, policies, procedures, processes, and controls for data security will be a central topic. Individual privacy, and data protection of sensitive private data within organizations, will be covered in detail.
Information on contact teaching time is available from the course guide.
Assessment Type | Summative | Weighting | 30 | |
---|---|---|---|---|
Assessment Weeks | 28 | Feedback Weeks | 31 | |
Feedback |
In writing |
Knowledge Level | Thinking Skill | Outcome |
---|---|---|
Conceptual | Understand | Understanding of organizations, and the nature and role of information governance in larger organizations. |
Procedural | Analyse | Ability to apply concepts of information governance to analyse cybersecurity scenarios. |
Procedural | Create | Understanding of data security, and ability to create architectural and operational solutions. |
Procedural | Create | Understanding of protection of data about private individuals held and processed by organizations, and how to achieve this through the application of controls. |
Procedural | Create | Understanding of issues in data privacy, and ability to design privacy preserving systems using privacy-enhancing technologies. |
Assessment Type | Summative | Weighting | 70 | |
---|---|---|---|---|
Assessment Weeks | 29 | Feedback Weeks | 32 | |
Feedback |
In writing |
Knowledge Level | Thinking Skill | Outcome |
---|---|---|
Conceptual | Understand | Understanding of organizations, and the nature and role of information governance in larger organizations. |
Procedural | Analyse | Ability to apply concepts of information governance to analyse cybersecurity scenarios. |
Procedural | Create | Understanding of data security, and ability to create architectural and operational solutions. |
Procedural | Create | Understanding of protection of data about private individuals held and processed by organizations, and how to achieve this through the application of controls. |
Procedural | Create | Understanding of issues in data privacy, and ability to design privacy preserving systems using privacy-enhancing technologies. |
There are no assessments for this course.
Assessment Type | Summative | Weighting | 100 | |
---|---|---|---|---|
Assessment Weeks | Feedback Weeks | |||
Feedback |
(Continuous Assessment Courses Only) Where a student fails the course overall they will be afforded the opportunity to resit those parts of the course that they failed (pass marks will be carried forward). |
Knowledge Level | Thinking Skill | Outcome |
---|---|---|
|
Knowledge Level | Thinking Skill | Outcome |
---|---|---|
Procedural | Create | Understanding of protection of data about private individuals held and processed by organizations, and how to achieve this through the application of controls. |
Conceptual | Understand | Understanding of organizations, and the nature and role of information governance in larger organizations. |
Procedural | Create | Understanding of data security, and ability to create architectural and operational solutions. |
Procedural | Create | Understanding of issues in data privacy, and ability to design privacy preserving systems using privacy-enhancing technologies. |
Procedural | Analyse | Ability to apply concepts of information governance to analyse cybersecurity scenarios. |
We have detected that you are have compatibility mode enabled or are using an old version of Internet Explorer. You either need to switch off compatibility mode for this site or upgrade your browser.