Wednesday, August 20, 2008

Latest Version of IAM Module

Latest Version based on all your kind feedback..

Module Overview
In a world where collaboration is increasingly the norm, information is an increasingly valuable asset. High profile attacks on organisations from foreign states, credit card information being stolen from unprotected wireless networks, or simply the loss of personal data sent through the post on CD-ROMs, all demonstrate the changing shape of the risks to that value. Information Systems are used to store and disseminate these information assets within and between organisations. Organisations therefore need to ensure they protect the communication and storage of this information in these systems by understanding the risks they face and putting in place appropriate measures to prevent their information assets from being compromised. This module will explore this Information Asset Management (IAM), and the role that information professionals take in IAM. Opening with the framing and history of IAM, the module will use key industry resources and knowledge of business information systems to approach the analysis of business risk and planning of information risk management, realised through real-life case studies and guest lectures.

Learning Outcomes
By the end of the module the student will be expected to be able to:
• Understand the different types of information threats and vulnerabilities that an information system may experience, and how they may impact businesses.
• Evaluate the information risks an information system may bring to a business and communicate the potential business impact of those risks.
• Analyse the security elements of information technology services, systems and assets within an organisation. This will include the competencies required to manage the confidentiality, integrity, and availability of data and information.
• Develop appropriate controls and/or mitigations to maximise the business value of an information asset, while ensuring the risk is kept to an appropriate level
• Show understanding of the various aspects of information asset governance, including policy development and related regulations, compliance practises and issues.
• Demonstrate understanding of the techniques used to manage data and information within an organisation and as it crosses into and out of an organisation. This includes the IT and information management processes involved in the acquisition, creation, categorisation, storage, transfer and disposal of data and information.


Initial Plans for the Assessment

2 hour unseen examination

Initial Group development and implementation of an Audit Plan:
Based on a case study of Company X, that holds a number of information risks of various degrees of complexity and transparency. In groups, students will produce an audit plan, and implement the information risk assessment. The case study is based upon real-life situations.
Groups will have the opportunity to interview a guest IT professional and the lecturer who will both role-play Business and IT Leaders in the Case.

To address the following learning outcomes:
- Evaluate the information risks information systems may bring to a business and communicate the potential business impact of those risks.
- Analyse the security elements of information technology services, systems and assets within an organisation. This also covers the competencies required to manage the confidentiality, integrity of and availability of data and information
- Show their understanding of the various aspects of information asset governance, including policy development and related regulations, compliance practises and issues.
The development and implementation of the audit plan allows discovery of the risks. Feedback will be given on the approaches the groups have taken.

Group Information Risk Assessment and Control Plan Presentation:
Subsequently the groups should analyse their assessment develop their proposals for the final phase. In this phase the groups will present their assessment and proposals, as if to Company X’s Audit Committee. They will produce a written audit document, to include; an executive summary, a detailed information risk assessment, an outline of the potential impacts, and any proposed policies, controls and/or mitigations.

To address the following learning outcomes:
- Evaluate the information risks an information system may bring to a business and communicate the potential business impact of those risks.
- Analyse the security elements of information technology services, systems and assets within an organisation. This also covers the competencies required to manage the confidentiality, integrity of and availability of data and information
- Develop appropriate controls and/or mitigations to maximise the business value of an information asset, while ensuring the risk is kept to an appropriate level.
- Show their understanding of the various aspects of information asset governance, including policy development and related regulations, compliance practises and issues.
The Information Risk Assessment and Control Plan will be marked per group, but an individual portion of the marks will be assigned based on how well each student worked within the group.

No comments:

Post a Comment

Thanks in advance for sharing your thoughts...