ITC568 Cloud Privacy and Security (8)
Abstract
This subject focuses on issues surrounding cloud computing privacy and security and their application to business. It discusses the governance framework that must underpin and define the processes for determining risk, privacy and security issues for an enterprise which uses a cloud model. It will examine the legal and business requirements for privacy, the need for a risk management assessment of all data used in cloud operations, and the use of security controls to manage the assessed risk. It further examines the major cloud deployment and delivery models to determine how these affect the risk management assessment and subsequent security controls when applied to business. |
|
|
+ Subject Availability Modes and Location
Session 2 | Internal | CSU Study Centre Melbourne | Distance | Bathurst Campus |
Continuing students should consult the SAL for current offering details: ITC568
Where differences exist between the Handbook and the SAL, the SAL should be taken as containing the correct subject offering details.
|
|
Subject informationDuration | Grading System | School: |
---|
One session | HD/FL | School of Computing and Mathematics |
|
|
Learning OutcomesUpon successful completion of this subject, students should:
- be able to examine the legal, business and privacy requirements for a cloud deployment model;
- be able to evaluate the risk management requirements for a cloud deployment model;
- be able to critically analyse the legal, ethical and business concerns for the security and privacy of data to be deployed to the cloud;
- be able to develop and present a series of proposed security controls to manage the security and privacy of data deployed to the cloud;
- be able to develop and present a cloud governance framework to underpin the cloud operations for an enterprise.
|
|
|
SyllabusThe subject will cover the following topics:
- Governance and auditing for cloud operations.
- Threats, risk and requirements landscape.
- Privacy, data and digital identity.
- Data sensitivity, location and legal jurisdiction.
- Cloud security approaches and challenges.
|
|
|
Back
The information contained in the 2017 CSU Handbook was accurate at the date of publication: 12 August 2016. The University reserves the right to vary the information at any time without notice.