Module Details

Module Code: SAFE
Module Title: Project Incident Handling and Risk Analysis
Title: Project Incident Handling and Risk Analysis
Module Level:: 6
Credits:: 10
Module Coordinator: Nigel Whyte
Module Author:: Christopher Staff
Domains:  
Module Description: To develop learners’ knowledge of information security incident handling and perform risk analysis on information systems.
 
Learning Outcomes
On successful completion of this module the learner will be able to:
# Learning Outcome Description
LO1 Identify and document information security events.
LO2 Plan an appropriate incident handling policy.
LO3 Mitigate risk by evaluating risk management strategies.
LO4 Produce and justify a contigency plan which incorporates disaster recovery.
Dependencies
Module Recommendations

This is prior learning (or a practical skill) that is recommended before enrolment in this module.

No recommendations listed
Co-requisite Modules
No Co-requisite modules listed
Additional Requisite Information
No Co Requisites listed
 
Indicative Content
Information Security Overview
Modern security threats, information security, data classification and incident handling. What is an information security event and the management of information security events.
Vulnerability, Threats and Attacks
Conducting vulnerability assessment, creating a security baseline. Security models, CIA model (Confidentiality, Integrity, Authentication), types of attacks and countermeasures.
Types of Computer Security Incident
Physical security, malicious code, network scanning/penetration, host compromise, database and web vulnerabilities, denial of service and data compromise/theft.
Incident Response
Intrusion detection and prevention systems, security policies and procedures, social engineering threats. Incident handling strategies (Proactive/Reactive) and forensic principles and policy.
Concepts of Risk Analysis
Security planning, risk management and contingency planning/disaster recovery. Policies, procedures, auditing and monitoring.
Security Planning
Risk assessment, risk mitigation - deploy controls and minimize exposure. Education - raise threat awareness and publicize event reports, procedures and reviews.
Risk Management Framework
Physical Security Measures, Personnel Security Practices and Procedures. Administrative Security Procedural Controls. Risk assessment methodologies, strategies and cost/benefit analysis.
Contingency Planning/Disaster Recovery
Disaster classification, disaster recovery plan (detection, response and recovery). Crisis management, impact analysis, communication and follow up.
The Insider Threat
Threats from individuals. Malicious threats from disgruntled employees, former employees, contractors or business associates with insider knowledge. Non-malicious from uninformed staff.
Relevant Security Policies, Frameworks and Publications
Examples - NIST Computer Security Incident Handling Guide and CERT Computer Security Incident Response Team Publications.
Module Content & Assessment
Assessment Breakdown%
Project100.00%

Assessments

Full Time

No Continuous Assessment
Project
Assessment Type Project % of Total Mark 100
Timing Week 13 Learning Outcomes 1,2,3,4
Non-marked No
Assessment Description
Learners will work in teams of two or three throughout the project and can expect to receive feedback on project-related material submitted by weeks 3, 6, and 8.
No Practical
No End of Module Formal Examination
Reassessment Requirement
Coursework Only
This module is reassessed solely on the basis of re-submitted coursework. There is no repeat written examination.

SETU Carlow Campus reserves the right to alter the nature and timings of assessment

 

Module Workload

Workload: Full Time
Workload Type Workload Category Contact Type Workload Description Frequency Average Weekly Learner Workload Hours
Lecture Contact No Description 12 Weeks per Stage 4.00 48
Project Non Contact No Description 13 Weeks per Stage 5.54 72
Independent Learning Non Contact No Description 15 Weeks per Stage 8.67 130
Total Weekly Contact Hours 4.00
 
Module Resources
Recommended Book Resources
  • Luttgens & Pepe. (2014), Incident Response and Computer Forensics, 3rd. New York; McGraw-Hill Osborne, [ISBN: 0071798684].
  • William Stallings,Lawrie Brown. (2018), Computer Security, 4th. Pearson, p.778, [ISBN: 9780134794105].
This module does not have any article/paper resources
Other Resources
Discussion Note: