This unit explores cybersecurity as it is managed in the business context. It covers the processes of threat and risk analysis, security policy development, incident prevention and response, issues around privacy, professional codes of conduct, and looks at legislative efforts around the world intended to address privacy and cybersecurity issues. It also looks at the ethical issues that cybersecurity research raises, and the ways that this affects how cybersecurity researchers can operate.
|Unit name||Cybersecurity Policies and Practices|
|College/School||College of Sciences and Engineering
School of Information and Communication Technology
|Discipline||Information & Communication Technology|
|Coordinator||Doctor Mira Park|
|Delivered By||University of Tasmania|
|Location||Study period||Attendance options||Available to|
- International students
- Domestic students
Please check that your computer meets the minimum System Requirements if you are attending via Distance/Off-Campus.
Units are offered in attending mode unless otherwise indicated (that is attendance is required at the campus identified). A unit identified as offered by distance, that is there is no requirement for attendance, is identified with a nominal enrolment campus. A unit offered to both attending students and by distance from the same campus is identified as having both modes of study.
|Study Period||Start date||Census date||WW date||End date|
* The Final WW Date is the final date from which you can withdraw from the unit without academic penalty, however you will still incur a financial liability (refer to How do I withdraw from a unit? for more information).
Unit census dates currently displaying for 2024 are indicative and subject to change. Finalised census dates for 2024 will be available from the 1st October 2023. Note census date cutoff is 11.59pm AEST (AEDT during October to March).
- Analyse industry approaches to cybersecurity practices as they relate to privacy and the law
- Investigate and communicate effective policies and processes designed to improve an organisation's cybersecurity posture
- Develop a cohesive security policy for a company that meets their threat and risk profile
- Discuss the ethical issues that cybersecurity researchers face to assess the ethicality of given scenarios
|Field of Education||Commencing Student Contribution 1,3||Grandfathered Student Contribution 1,3||Approved Pathway Course Student Contribution 2,3||Domestic Full Fee 4|
1 Please refer to more information on student contribution amounts.
2 Please refer to more information on eligibility and Approved Pathway courses.
3 Please refer to more information on eligibility for HECS-HELP.
4 Please refer to more information on eligibility for FEE-HELP.
Please note: international students should refer to What is an indicative Fee? to get an indicative course cost.
2-hour lectures weekly
12 x 2-hour tutorials - This unit will only offer on-campus tutorials
|Assessment||Research and Case studies during Tutorials (15%)|Research on cybersecurity (15%)|Risk assessment and Cybersecurity policy writing (30%)|End of unit test (40%)|
|Timetable||View the lecture timetable | View the full unit timetable|
Required readings will be listed in the unit outline prior to the start of classes.
|Links||Booktopia textbook finder|
The University reserves the right to amend or remove courses and unit availabilities, as appropriate.