ITC568 Cloud Privacy and Security (8)

This subject focuses on issues surrounding cloud computing privacy and security and their application to business. It discusses the governance framework that must underpin and define the processes for determining risk, privacy and security issues for an enterprise which uses a cloud model. It will examine the legal and business requirements for privacy, the need for a risk management assessment of all data used in cloud operations, and the use of security controls to manage the assessed risk. It further examines the major cloud deployment and delivery models to determine how these affect the risk management assessment and subsequent security controls when applied to business.

Availability

Session 2 (60)
On Campus
CSU Study Centre Brisbane
CSU Study Centre Melbourne
Online
Bathurst Campus

Continuing students should consult the SAL for current offering details: ITC568. Where differences exist between the Handbook and the SAL, the SAL should be taken as containing the correct subject offering details.

Subject Information

Grading System

HD/FL

Duration

One session

School

School of Computing and Mathematics

Enrolment Restrictions

Only available to postgraduate students.

Assumed Knowledge

ITC561 Cloud Computing

Learning Outcomes

Upon successful completion of this subject, students should:
  • be able to examine the legal, business and privacy requirements for a cloud deployment model;
  • be able to evaluate the risk management requirements for a cloud deployment model;
  • be able to critically analyse the legal, ethical and business concerns for the security and privacy of data to be deployed to the cloud;
  • be able to develop and present a series of proposed security controls to manage the security and privacy of data deployed to the cloud;
  • be able to develop and present a cloud governance framework to underpin the cloud operations for an enterprise.

Syllabus

This subject will cover the following topics:
  • Governance and auditing for cloud operations.
  • Threats, risk and requirements landscape.
  • Privacy, data and digital identity.
  • Data sensitivity, location and legal jurisdiction.
  • Cloud security approaches and challenges.

The information contained in the CSU Handbook was accurate at the date of publication: January 2020. The University reserves the right to vary the information at any time without notice.

Back