Summary

This document outlines a course structure covering various aspects of cyber security and privacy, including fundamental concepts, security management, risk, compliance, contingency planning, and privacy regulations.

Full Transcript

Week 1: Introduction - Introduction to cyber security, Confidentiality, integrity, and availability. Week 2: Foundations - Fundamental concepts, CIA, CIA triangle, data breach at target. Week 3: Security management, Governance, risk, and compliance (GRC)- GRC framework, security standards. Week 4...

Week 1: Introduction - Introduction to cyber security, Confidentiality, integrity, and availability. Week 2: Foundations - Fundamental concepts, CIA, CIA triangle, data breach at target. Week 3: Security management, Governance, risk, and compliance (GRC)- GRC framework, security standards. Week 4: Contingency planning - Incidence response, Disaster Recovery, BCP. Week 5: Cyber security policy - ESSP, ISSP, SYSSP. Week 6: Risk Management - Cyber Risk Identification, Assessment, and Control. Week 7: Cyber security: Industry perspective - Defense Technologies, Attack, Exploits Week 8: Cyber security technologies - Access control, Encryption, Standards. Week 9: Foundations of privacy - Information privacy, Measurement, Theories. Week 10: Privacy regulation - Privacy, Anonymity, Regulation, Data Breach. Week 11: Privacy regulation in Europe, Privacy: The Indian Way - Data Protection, GDPR, DPDP, Aadhar. Week 12: Information privacy: Economics and strategy, Economic value of privacy, privacy valuation, WTA and WTC, Business strategy and privacy, espionage, Privacy vs safety. R20. The dark side of customer analytics. HBR Case, 2007, accessible at: https://www.pomsmeetings.org/ConfPapers/052/052-0002.pdf

Use Quizgecko on...
Browser
Browser