Syllabuses - PG

CS810 - Compliance and Operational Security Management

TIMETABLETEACHING MATERIAL
Credits15
Level5
SemesterTerm 2
Availability
Prerequisites
Learning Activities Breakdown
Items of Assessment2
Assessment100% Coursework:

  1. Coursework 1 (50%): Logging and monitoring procedure for cyber attacks
  2. Coursework 2 (50%): Report exploring theoretical knowledge and understanding of concepts. 
LecturerJide Edu

Aims and Objectives

The aim of this class is to provide in depth coverage of security monitoring and event management from the perspective of continuous compliance monitoring, as well as business continuity and recovery procedures in the context of overall cyber resilience.

Learning Outcomes

By the end of the module you should be able to:

  1. Develop and implement a monitoring and logging plan 
  2. Support cyber security compliance such as compliance with GDPR or cyber frameworks
  3. Perform data analysis on security data for improved cyber resilience
  4. Assist in developing business continuity and disaster recovery plans and procedures

Syllabus

  • Applying Security Operations Concepts: Need-to-Know Access; Principle of Least Privilege; Entitlement; Aggregation; Transitive Trust; Separation of Privilege; Segregation of Duties; Two-Person Control; Job Rotation; Mandatory Vacations
  • Privileged Account Management
  • Managing the Information Lifecycle: Creation or Capture, Classification, Storage, Usage, Archive, Destruction or Purging – Compliance Requirement (GDPR)
  • Personnel Safety and Security 
  • Managing Hardware and Software Assets; Protecting Physical Assets; Managing Virtual Assets; Managing Cloud-based Assets; Media Management; Managing Media Lifecycle
  • Managing Patches and Reducing Vulnerabilities
  • Logging, Monitoring and Auditing; Security Auditing Architecture
  • SIEM, Firewall and IDS/IPS configuration and tuning 
  • Backups and Offsite Storage
  • Business Continuity Planning & Dealing with Disaster

Recommended Reading

This list is indicative only – the class lecturer may recommend alternative reading material. Please do not purchase any of the reading material listed below until you have confirmed with the class lecturer that it will be used for this class.

  1. Arthur R. Miller. (4374). The Privacy Issue. NIST. https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nbsspecialpublication404.pdf
  2. Basin, David. author. (2011). Applied Information Security [internet resource] : A Hands-on Approach (Patrick. author. Schaller & Michael. author. Schläpfer, Eds.; 1st ed. 2011..). Berlin, Heidelberg : Springer Berlin Heidelberg.
  3. Gantz, S. D., & Philpott, D. R. (Eds.). (2013). FISMA and the risk management framework : the new practice of federal cyber security / [internet resource]. Boston : Syngress.
  4. Jacobs, J. (2014). Data-driven security [internet resource] : analysis, visualization and dashboards (B. author Rudis, Ed.). Indianapolis, Ind. : Wiley Blackwell.
  5. Sunill Gupta. (809). Logging and Monitoring to Detect Network Intrusions and Compliance Violations in the Environment. https://www.sans.org/reading-room/whitepapers/detection/paper/33985

Last updated: 2024-08-12 07:33:56