Skip to main content
CSS343Social Sciences3 Unitsintermediate

Information System Security Management

This course introduces students to information gathering, technology security, access and control, methodology, and ethics in computer operations security. It explores Information Security Integration and models, Information Assurance into System Administration, Management Information Systems Useability and Associated Risk. The course also covers modern safety practices, warning signs in mitigating associated security threats, and various information systems assessments, risk options, and models.

Transform this course into personalized study materials with AI

200h
Study Time
13
Weeks
15h
Per Week
basic
Math Level
Course Keywords
Information SecurityRisk ManagementSystem AnalysisData EncryptionCybersecurity

Course Overview

Everything you need to know about this course

Course Difficulty

Intermediate Level
Builds on foundational knowledge
65%
intermediate
Math Level
Basic Math
📖
Learning Type
Theoretical Focus

Course Topics

Key areas covered in this course

1

Information Gathering

2

Computer Security

3

System Analysis and Design

4

Ethics of ICT

5

Risk Management

6

Water Quality Management

7

Information Security Investment

8

Information Warfare

Total Topics8 topics

Ready to Start

No specific requirements needed

This course is designed to be accessible to all students. You can start immediately without any prior knowledge or specific preparation.

Assessment Methods

How your progress will be evaluated (3 methods)

assignments

Comprehensive evaluation of course material understanding

Written Assessment

tutor-marked assessments

Comprehensive evaluation of course material understanding

Written Assessment

final examination

Comprehensive evaluation of course material understanding

Written Assessment

Career Opportunities

Explore the career paths this course opens up for you

Security Analyst

Apply your skills in this growing field

IT Manager

Apply your skills in this growing field

Risk Manager

Apply your skills in this growing field

Information Security Officer

Apply your skills in this growing field

System Administrator

Apply your skills in this growing field

Industry Applications

Real-world sectors where you can apply your knowledge

GovernmentFinanceHealthcareTechnologyConsulting

Study Schedule Beta

A structured 13-week journey through the course content

Week
1

Module 1:

4h

Unit 1: Information gathering

4 study hours
  • Understand the strategies and methods for information gathering.
  • Identify information sources and develop a method for obtaining information.
  • Learn about system requirements specification and its importance.
Week
2

Module 1:

7h

Unit 2: Information security in the 21st century: with special emphasis on computer security

4 study hours
  • Examine the need for information security in the 21st century.
  • Understand the CIA (Confidentiality, Integrity, Availability) relationship.
  • Explore the modules and sub-modules of the information security chain.

Unit 3: Introduction to System Analysis and Design

3 study hours
  • Study the basic system components and their interdependencies.
  • Learn about the different phases of the system development life cycle.
  • Understand the components of system analysis and design.
Week
3

Module 1:

5h

Unit 4: Information system security: a guide to the use of water quality management principles I

5 study hours
  • Understand the relevance and role of monitoring and information needs in water management.
  • Learn about the importance of integration in water resources management.
  • Examine the interactions between human activities and water resources.
Week
4

Module 1:

5h

Unit 5: Information system security: a guide to the use of water quality management principles II

5 study hours
  • Understand the objective of an information system for water pollution control.
  • Learn about the types of data and information tools to be processed.
  • Examine the components of environmental management information systems.
Week
5

Module 2:

5h

Unit 1: Ethics of information communication technology (ICT)

5 study hours
  • Comprehend key information concerning ethical issues regarding ICT.
  • Analyze and evaluate the impact of ICT on society.
  • Understand UNESCO's Info-Ethics Programme and its objectives.
Week
6

Module 2:

7h

Unit 2: Identity and information security integration

4 study hours
  • Examine the historical perspective of identity and security.
  • Understand the need for identity and information security integration.
  • Learn about data discovery, classification, and security policy enforcement.

Unit 3: Integrating information assurance into system administration

3 study hours
  • Understand the types of services and facilities available to information system architects and administrators.
  • Learn about the information security implications of distributed computing.
  • Examine the security challenges in cloud computing environments.
Week
7

Module 2:

5h

Unit 4: Management information systems usability and associated risk

5 study hours
  • Learn the basic definition of Management Information Systems.
  • Understand the relevance of MIS and how it should be designed.
  • Examine the various risks associated with the management of MIS.
Week
8

Module 2:

5h

Unit 5: Elevating information security to business security

5 study hours
  • Understand that information security governance has an enterprise-wide risk mitigating impact.
  • Learn about the risks mitigated by an information security governance plan.
  • Explore the concept of elevating information security to business security.
Week
9

Module 3:

5h

Unit 1: The information systems and the economics of innocent fraud management

5 study hours
  • Describe the connection between the use of ICTs and financial crime.
  • Understand the need for ICTs as a tool to fight the lack of transparency.
  • Examine the role of ICT in fraud and the clearing case.
Week
10

Module 3:

5h

Unit 2: An overview of information security as a risk management function

5 study hours
  • Understand the concept of Risk management as a management responsibility.
  • Learn about the key roles of personnel in the risk management process.
  • Examine the integration of risk management into the SDLC.
Week
11

Module 3:

5h

Unit 3: Risk assessment

5 study hours
  • Understand the various concepts such as vulnerability, threat sources, level of impact.
  • Appraise vulnerability in an IT system using the nine primary steps in risk assessment methodology.
Week
12

Module 3:

5h

Unit 4: Risk mitigation options

5 study hours
  • Understand the various risk mitigation options and strategy.
  • Learn about the approaches for risk mitigation control, implementation, and control categories.
  • Examine the cost-benefit analysis in risk control.
Week
13

Module 3:

5h

Unit 5: Mitigating economic risk through security technology

5 study hours
  • Define the components of risk mitigation through investment in security technology.
  • Understand the descriptive statistics that illuminate real-world occurrences.
  • Learn how to apply the numerical values in organizations.

This study schedule is in beta and may not be accurate. Please use it as a guide and consult the course outline for the most accurate information.

Course PDF Material

Read the complete course material as provided by NOUN.

Access PDF Material

Study Tips & Exam Preparation

Expert tips to help you succeed in this course

1

Create concept maps linking Units 1-3 information gathering techniques.

2

Practice data flow diagramming from Unit 1 weekly.

3

Review the CIA triad (Confidentiality, Integrity, Availability) from Unit 2 and apply it to different scenarios.

4

Study the phases of system development life cycle from Unit 3 and their importance.

5

Focus on the ethical considerations in ICT from Unit 6, particularly privacy and security.

6

Understand the different risk mitigation options from Module 3 and their applications.

7

Review all TMAs and tutor feedback to identify areas of weakness.

Related Courses

Other courses in Social Sciences that complement your learning