Explore UCD

UCD Home >

MIS3009S

Academic Year 2024/2025

Cyber Security (MIS3009S)

Subject:
Management Information Systems
College:
Business
School:
Business
Level:
3 (Degree)
Credits:
10
Module Coordinator:
Dr Matthias Glowatz
Trimester:
Autumn and Summer (separate)
Mode of Delivery:
Blended
Internship Module:
No
How will I be graded?
Letter grades

Curricular information is subject to change.

This module introduces the cybersecurity industry and its technology. Through case studies, simulations, and problem-solving activities, students will learn how to manage and evaluate cybersecurity technology assets and personnel, apply risk management strategies, and gain experience strategizing defensive measures and attack responses in public and private organizations. Designed for future Chief Information Officers, Chief Security Officers, and IT managers, students learn how to understand, evaluate, and critically respond to this fast-growing industry and technology. This module adopts a broad and non-technical view of cybersecurity and explores novel and emerging applications of cryptographic technologies (e.g., decentralized autonomous corporations and self-sovereign identities), hacking and cybercrime, advanced persistent threats, corporate espionage, and critical infrastructure protection. The course approach is multidisciplinary and cuts across business and management science, criminology, political science, sociology, and computer science. Readings and course activities are non-technical and do not require a prior technology background.

About this Module

Learning Outcomes:

On completion of this module, students will be able to:
● Choose and apply cybersecurity frameworks and evaluate cyber risk
● Explain how encryption and authentication works and how attacks are mitigated
● Evaluate the impact of cybersecurity technologies on society
● Describe and theorize the recent history of information security
● Identify and evaluate criteria for cybersecurity technology procurement and implementation
● Summarize cryptographically-secure governance, identity, and management technologies
● Debate ethical and social values for emerging technologies, surveillance, and privacy
● Make use of and develop novel research methods
● Practice teamwork and leadership skills

Student Effort Hours:
Student Effort Type Hours
Specified Learning Activities

85

Autonomous Student Learning

102

Lectures

20

Total

207


Approaches to Teaching and Learning:
Students will attend classes for this module and have the opportunity to engage in active learning during these sessions. There will be in-class discussion and group work to analyse module concepts. Where appropriate, the module will incorporate case based learning.

Requirements, Exclusions and Recommendations

Not applicable to this module.


Module Requisites and Incompatibles
Not applicable to this module.
 

Assessment Strategy
Description Timing Component Scale Must Pass Component % of Final Grade In Module Component Repeat Offered
Assignment(Including Essay): Continuous Assessment Week 7 Standard conversion grade scale 40% No
40
No
Exam (In-person): Face to face Examination Week 15 Standard conversion grade scale 40% No
60
No

Carry forward of passed components
No
 

Remediation Type Remediation Timing
Repeat Within Two Trimesters
Please see Student Jargon Buster for more information about remediation types and timing. 

Feedback Strategy/Strategies

• Group/class feedback, post-assessment

How will my Feedback be Delivered?

General feedback is provided to students on all their submitted assessment components.

Name Role
Dr Christina Burke Tutor
Ms Michele Connolly Doran Tutor
Dr Matthias Glowatz Tutor
Shirley Ho Tutor
Abdul Gafoor Zahir Hussain Tutor
Satish Kumar Tutor
Rachel Sim Tutor
Chee Shong Tan Tutor
Charlene Tan Puay Koon Tutor
V Sithira D/O Vadivel Tutor