Module Details
Module Code: |
SAFE |
Module Title:
|
Project Incident Handling and Risk Analysis
|
Title:
|
Project Incident Handling and Risk Analysis
|
Module Level:: |
6 |
Module Coordinator: |
Nigel Whyte
|
Module Author:: |
Christopher Staff
|
Module Description: |
To develop learners’ knowledge of information security incident handling and perform risk analysis on information systems.
|
Learning Outcomes |
On successful completion of this module the learner will be able to: |
# |
Learning Outcome Description |
LO1 |
Identify and document information security events. |
LO2 |
Plan an appropriate incident handling policy. |
LO3 |
Mitigate risk by evaluating risk management strategies. |
LO4 |
Produce and justify a contigency plan which incorporates disaster recovery. |
Dependencies |
Module Recommendations
This is prior learning (or a practical skill) that is recommended before enrolment in this module.
|
No recommendations listed |
Co-requisite Modules
|
No Co-requisite modules listed |
Additional Requisite Information
|
No Co Requisites listed
|
Indicative Content |
Information Security Overview
Modern security threats, information security, data classification and incident handling. What is an information security event and the management of information security events.
|
Vulnerability, Threats and Attacks
Conducting vulnerability assessment, creating a security baseline. Security models, CIA model (Confidentiality, Integrity, Authentication), types of attacks and countermeasures.
|
Types of Computer Security Incident
Physical security, malicious code, network scanning/penetration, host compromise, database and web vulnerabilities, denial of service and data compromise/theft.
|
Incident Response
Intrusion detection and prevention systems, security policies and procedures, social engineering threats. Incident handling strategies (Proactive/Reactive) and forensic principles and policy.
|
Concepts of Risk Analysis
Security planning, risk management and contingency planning/disaster recovery. Policies, procedures, auditing and monitoring.
|
Security Planning
Risk assessment, risk mitigation - deploy controls and minimize exposure. Education - raise threat awareness and publicize event reports, procedures and reviews.
|
Risk Management Framework
Physical Security Measures, Personnel Security Practices and Procedures. Administrative Security Procedural Controls. Risk assessment methodologies, strategies and cost/benefit analysis.
|
Contingency Planning/Disaster Recovery
Disaster classification, disaster recovery plan (detection, response and recovery). Crisis management, impact analysis, communication and follow up.
|
The Insider Threat
Threats from individuals. Malicious threats from disgruntled employees, former employees, contractors or business associates with insider knowledge. Non-malicious from uninformed staff.
|
Relevant Security Policies, Frameworks and Publications
Examples - NIST Computer Security Incident Handling Guide and CERT Computer Security Incident Response Team Publications.
|
Module Content & Assessment
|
Assessment Breakdown | % |
Project | 100.00% |
AssessmentsFull Time
No End of Module Formal Examination |
Reassessment Requirement |
Coursework Only
This module is reassessed solely on the basis of re-submitted coursework. There is no repeat written examination.
|
SETU Carlow Campus reserves the right to alter the nature and timings of assessment
Module Workload
Workload: Full Time |
Workload Type |
Workload Category |
Contact Type |
Workload Description |
Frequency |
Average Weekly Learner Workload |
Hours |
Lecture |
|
Contact |
No Description |
12 Weeks per Stage |
4.00 |
48 |
Project |
|
Non Contact |
No Description |
13 Weeks per Stage |
5.54 |
72 |
Independent Learning |
|
Non Contact |
No Description |
15 Weeks per Stage |
8.67 |
130 |
Total Weekly Contact Hours |
4.00 |
Module Resources
|
Recommended Book Resources |
---|
-
Luttgens & Pepe. (2014), Incident Response and Computer Forensics, 3rd. New York; McGraw-Hill Osborne, [ISBN: 0071798684].
-
William Stallings,Lawrie Brown. (2018), Computer Security, 4th. Pearson, p.778, [ISBN: 9780134794105].
| This module does not have any article/paper resources |
---|
Other Resources |
---|
-
SANS Institute. (2016), Information Security Resources,
-
NIST. (2016), NIST Computer Security Division, NIST,
-
The MITRE Corporation. Mitre Att&ck,
|
|