CONTACT CSU

ITC568 Cloud Privacy and Security (8)

Abstract

This subject focuses on issues surrounding cloud computing privacy and security and their application to business.  It discusses the governance framework that must underpin and define the processes for determining risk, privacy and security issues for an enterprise which uses a cloud model. It will examine the legal and business requirements for privacy, the need for a risk management assessment of all data used in cloud operations, and the use of security controls to manage the assessed risk. It further examines the major cloud deployment and delivery models to determine how these affect the risk management assessment and subsequent security controls when applied to business.

+ Subject Availability Modes and Location

Session 2
InternalCSU Study Centre Melbourne
DistanceBathurst Campus
Continuing students should consult the SAL for current offering details: ITC568
Where differences exist between the Handbook and the SAL, the SAL should be taken as containing the correct subject offering details.

Subject information

Duration Grading System School:
One sessionHD/FLSchool of Computing and Mathematics

Assumed Knowledge

ITC561 Cloud Computing

Learning Outcomes

Upon successful completion of this subject, students should:
  • be able to examine the legal, business and privacy requirements for a cloud deployment model;
  • be able to evaluate the risk management requirements for a cloud deployment model;
  • be able to critically analyse the legal, ethical and business concerns for the security and privacy of data to be deployed to the cloud;
  • be able to develop and present a series of proposed security controls to manage the security and privacy of data deployed to the cloud;
  • be able to develop and present a cloud governance framework to underpin the cloud operations for an enterprise.

Syllabus

The subject will cover the following topics:
  • Governance and auditing for cloud operations.
  • Threats, risk and requirements landscape.
  • Privacy, data and digital identity.
  • Data sensitivity, location and legal jurisdiction.
  • Cloud security approaches and challenges.

Back

The information contained in the 2017 CSU Handbook was accurate at the date of publication: 12 August 2016. The University reserves the right to vary the information at any time without notice.