Teaching Responsibility
LJMU Schools involved in Delivery:
Justice Studies
Learning Methods
Online
Module Offerings
7139PS-APR-MTP
7139PS-JAN-MTP
7139PS-SEP-MTP
7139PS-SEP_NS-CTY
Aims
This module aims to provide students with an appreciation of the benefits security management within a business environment and over cyber space. This includes the choice and application of appropriate risk assessment and risk control techniques, the understanding of security standards & procedures, coupled with the application of technology & security measures in a business setting.
Learning Outcomes
1.
Explain why security management is essential in today's business
environment.
2.
Critically appraise the different approaches to risk management.
3.
Critically evaluate the issues related to information security standards and procedures.
4.
Critically evaluate the suitability of security risk assessment techniques in a particular context.
Module Content
Outline Syllabus:
• Security risk assessment: an overview of security risk assessment techniques, assessing, selecting and implementing security risk assessment techniques, development of a prioritised list of information security threats; • Security risk management: assessing, selecting and implementing controls for particular security threats; • Cyber security technologies and security mechanisms; • Legal, ethical, and professional Issues; • Security standards and procedures: reviewing relevant standards and procedures for information/cyber security.
• Security risk assessment: an overview of security risk assessment techniques, assessing, selecting and implementing security risk assessment techniques, development of a prioritised list of information security threats; • Security risk management: assessing, selecting and implementing controls for particular security threats; • Cyber security technologies and security mechanisms; • Legal, ethical, and professional Issues; • Security standards and procedures: reviewing relevant standards and procedures for information/cyber security.
Module Overview:
This module aims to equip students with an understanding of security management in both business and cyberspace contexts. It covers risk assessment and control techniques, security standards and procedures, and the use of technology and security measures within business environments.
This module aims to equip students with an understanding of security management in both business and cyberspace contexts. It covers risk assessment and control techniques, security standards and procedures, and the use of technology and security measures within business environments.
Additional Information:
This module in security management aims to support the growing need for more formal, systematic approaches to the core areas of risk/security management and to provide you with relevant theoretical and practical knowledge of these areas. The key theorists and practical methodologies will be covered. This includes the choice and application of appropriate risk assessment and risk control techniques, the understanding of security standards & procedures, coupled with the application of cybersecurity technology & security measures in a business setting.
This module in security management aims to support the growing need for more formal, systematic approaches to the core areas of risk/security management and to provide you with relevant theoretical and practical knowledge of these areas. The key theorists and practical methodologies will be covered. This includes the choice and application of appropriate risk assessment and risk control techniques, the understanding of security standards & procedures, coupled with the application of cybersecurity technology & security measures in a business setting.