CQUniversity Unit Profile
COIT20263 Information Security Management
Information Security Management
All details in this unit profile for COIT20263 have been officially approved by CQUniversity and represent a learning partnership between the University and you (our student).
The information will not be changed unless absolutely necessary and any change will be clearly indicated by an approved correction included in the profile.
General Information

Overview

This unit provides you with a thorough understanding of the managerial aspects of information security in a business organisation. You will complement your existing knowledge of information and communication technologies by studying the organisational and management issues relevant to information security. You will learn about the importance of information security plans, security risk management and compliance monitoring, and develop and apply security policies and best practices. Through case studies, you will consider information security strategies that support business objectives while being aware of legal and ethical obligations. As a result, you will have the knowledge and skills to contribute to information security governance in accordance with standards set by governments, professional bodies and industry.

Details

Career Level: Postgraduate
Unit Level: Level 9
Credit Points: 6
Student Contribution Band: 8
Fraction of Full-Time Student Load: 0.125

Pre-requisites or Co-requisites

Prerequisite: COIT20261 Network Routing and Switching

Important note: Students enrolled in a subsequent unit who failed their pre-requisite unit, should drop the subsequent unit before the census date or within 10 working days of Fail grade notification. Students who do not drop the unit in this timeframe cannot later drop the unit without academic and financial liability. See details in the Assessment Policy and Procedure (Higher Education Coursework).

Offerings For Term 3 - 2025

Online

Attendance Requirements

All on-campus students are expected to attend scheduled classes - in some units, these classes are identified as a mandatory (pass/fail) component and attendance is compulsory. International students, on a student visa, must maintain a full time study load and meet both attendance and academic progress requirements in each study period (satisfactory attendance for International students is defined as maintaining at least an 80% attendance record).

Class and Assessment Overview

Recommended Student Time Commitment

Each 6-credit Postgraduate unit at CQUniversity requires an overall time commitment of an average of 12.5 hours of study per week, making a total of 150 hours for the unit.

Class Timetable

Bundaberg, Cairns, Emerald, Gladstone, Mackay, Rockhampton, Townsville
Adelaide, Brisbane, Melbourne, Perth, Sydney

Assessment Overview

1. In-class Test(s)
Weighting: 30%
2. Presentation
Weighting: 30%
3. Written Assessment
Weighting: 40%

Assessment Grading

This is a graded unit: your overall grade will be calculated from the marks or grades for each assessment task, based on the relative weightings shown in the table above. You must obtain an overall mark for the unit of at least 50%, or an overall grade of 'pass' in order to pass the unit. If any 'pass/fail' tasks are shown in the table above they must also be completed successfully ('pass' grade). You must also meet any minimum mark requirements specified for a particular assessment task, as detailed in the 'assessment task' section (note that in some instances, the minimum mark for a task may be greater than 50%). Consult the University's Grades and Results Policy for more details of interim results and final grades.

Previous Student Feedback

Feedback, Recommendations and Responses

Every unit is reviewed for enhancement each year. At the most recent review, the following staff and student feedback items were identified and recommendations were made.

Feedback from Unit coordinator's reflection

Feedback

The introduction of in-class tests, spread throughout the term, encouraged students to review and understand their unit topics consistently

Recommendation

Continue administering in-class tests and refine them as needed.

Feedback from Unit coordinator's reflection

Feedback

Student may resort to GenAI to develop content for their presentation and report.

Recommendation

Develop and implement strategies to mitigate the impacts of GenAI on the assessments.

Unit Learning Outcomes
On successful completion of this unit, you will be able to:
  1. Develop security policies and program for an organisations based on national and international standards and industry's best practice
  2. Apply appropriate security control mechanism to protect critical infrastructure
  3. Assess security risks and develop risk management strategies for an organisation
  4. Justify appropriate risk treatment options
  5. Integrate laws and ethics of information security management into the organisation's security framework.

The Australian Computer Society (ACS), the professional association for Australia's ICT sector, recognises the Skills Framework for the Information Age (SFIA). SFIA is adopted by organisations, governments, and individuals in many countries and provides a widely used and consistent definition of ICT skills. SFIA is increasingly being used when developing job descriptions and role profiles. ACS members can use the tool MySFIA to build a skills profile.
 
This unit contributes to the following workplace skills as defined by SFIA8. The SFIA code is included:
  • Information Management (IRMG)
  • Information Security (SCTY)
  • Risk Management (BURM);
  • Continuity Management (COPL)
  • Methods and Tools (METL)

The National Initiative for Cybersecurity Education (NICE) Framework defines knowledge, skills and tasks needed to perform various cyber security roles. Developed by the National Institute of Standards and Technology (NIST), the NICE Framework is used by organisations to plan their workforce, including recruit into cyber security positions.

This unit helps prepare you for roles such as Systems Security Analyst, Network Operations Specialist and Systems Administrator, contributing to the following knowledge and skills:

  • K0002 Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).
  • K0003 Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy.
  • K0004 Knowledge of cybersecurity and privacy principles.
  • K0038 Knowledge of cybersecurity and privacy principles used to manage risks related to the use, processing, storage, and transmission of information or data.
  • K0040 Knowledge of vulnerability information dissemination sources (e.g., alerts, advisories, errata, and bulletins).
  • K0263 Knowledge of information technology (IT) risk management policies, requirements, and procedures.
  • K0267 Knowledge of laws, policies, procedures, or governance relevant to cybersecurity for critical infrastructures.
  • K0276 Knowledge of security management.

Alignment of Learning Outcomes, Assessment and Graduate Attributes
N/A Level
Introductory Level
Intermediate Level
Graduate Level
Professional Level
Advanced Level

Alignment of Assessment Tasks to Learning Outcomes

Assessment Tasks Learning Outcomes
1 2 3 4 5
1 - In-class Test(s) - 30%
2 - Presentation - 30%
3 - Written Assessment - 40%

Alignment of Graduate Attributes to Learning Outcomes

Graduate Attributes Learning Outcomes
1 2 3 4 5
1 - Knowledge
2 - Communication
3 - Cognitive, technical and creative skills
4 - Research
5 - Self-management
6 - Ethical and Professional Responsibility
7 - Leadership
8 - Aboriginal and Torres Strait Islander Cultures
Textbooks and Resources

Textbooks

Supplementary

Management of Cybersecurity

Edition: 7 (2025)
Authors: Michael E. Whitman/Herbert J. Mattord
Cengage Learning
ISBN: Michael E. Whitman/Herbert J. Mattord

IT Resources

You will need access to the following IT resources:
  • CQUniversity Student Email
  • Internet
  • Unit Website (Moodle)
Referencing Style

All submissions for this unit must use the referencing style: Harvard (author-date)

For further information, see the Assessment Tasks.

Teaching Contacts
Mahmoud El Khodr Unit Coordinator
m.elkhodr@cqu.edu.au
Schedule
Week 1 Begin Date: 10 Nov 2025

Module/Topic

Introduction to the Management of Cybersecurity

Chapter

Book: Management of Cybersecurity 7th Edition

Chapter 1

Events and Submissions/Topic

Week 2 Begin Date: 17 Nov 2025

Module/Topic

Governance and Strategic Planning for Cybersecurity

Chapter

Chapter 2

Events and Submissions/Topic

Week 3 Begin Date: 24 Nov 2025

Module/Topic

Risk Management: Assessing Risk

Chapter

Chapter 3

Events and Submissions/Topic

Week 4 Begin Date: 01 Dec 2025

Module/Topic

Risk Management: Treating Risk

Chapter

Chapter 4

Events and Submissions/Topic

Start preparing for your quiz

Week 5 Begin Date: 08 Dec 2025

Module/Topic

Compliance: Law and Ethics

Chapter

Chapter 5

Events and Submissions/Topic

Start preparing for your quiz and check your quiz progress and due dates

Week 6 Begin Date: 15 Dec 2025

Module/Topic

Cybersecurity Policy

Chapter

Chapter 6

Events and Submissions/Topic

Quiz Due: Week 6 Monday (15 Dec 2025) 11:45 pm AEST
Vacation Week Begin Date: 22 Dec 2025

Module/Topic

Chapter

Events and Submissions/Topic

Vacation Week Begin Date: 29 Dec 2025

Module/Topic

Chapter

Events and Submissions/Topic

Week 7 Begin Date: 05 Jan 2026

Module/Topic

Developing the Cybersecurity Program

Chapter

Chapter 7

Events and Submissions/Topic

Start preparing for your presentation

Week 8 Begin Date: 12 Jan 2026

Module/Topic

Cybersecurity Management Models

Chapter

Chapter 8

Events and Submissions/Topic

Group Due: Week 8 Monday (12 Jan 2026) 11:45 pm AEST
Week 9 Begin Date: 19 Jan 2026

Module/Topic

Cybersecurity Management Practices

Chapter

Chapter 9

Events and Submissions/Topic

Week 10 Begin Date: 26 Jan 2026

Module/Topic

Planning for Contingencies

Chapter

Chapter 10

Events and Submissions/Topic

Week 11 Begin Date: 02 Feb 2026

Module/Topic

Cybersecurity Protection Mechanisms

Chapter

Chapter 12

Events and Submissions/Topic

Week 12 Begin Date: 09 Feb 2026

Module/Topic

Cybersecurity Maintenance

Chapter

Chapter 11

Events and Submissions/Topic

Group report happening this week


Group Due: Week 12 Friday (13 Feb 2026) 12:00 pm AEST
Exam Week Begin Date: 16 Feb 2026

Module/Topic

Chapter

Events and Submissions/Topic

Review/Exam Week Begin Date: 16 Feb 2026

Module/Topic

Chapter

Events and Submissions/Topic

Term Specific Information

Textbook use and standards alignment.

Weekly lectures and tutorials draw on Management of Cybersecurity (7th ed., 2025) by Michael E. Whitman and Herbert J. Mattord to scaffold governance, risk, policy, contingency planning, and protection mechanisms.

Unit coordination and contact.

Unit Coordinator: Dr Mahmoud Elkhodr. Email: m.elkhodr@cqu.edu.au

Check Moodle 'Unit Contact' Tab for contact details of your campus-based lecturer and tutors.

Expected response time is within two working days during teaching weeks.

Assessment Tasks

1 In-class Test(s)

Assessment Title
Quiz

Task Description

Due: In your tutorial class or as advised by the Unit Coordinator.
Format: Invigilated online quiz in Moodle.
Coverage: Weeks 1–5 (introduction; governance and strategic planning; risk assessment; risk treatment; compliance).


What you do:

You will complete a time-limited quiz consisting of auto-marked items (for example, multiple choice, matching, short interpretation/calculation). The quiz checks your grasp of core concepts and their practical application so that you are ready for the later assessments.


Conditions: Individual work, invigilated, closed book, no collaboration or external aids unless specified in an approved Accessibility plan.


Assessment Due Date

Week 6 Monday (15 Dec 2025) 11:45 pm AEST

In your tutorial class or as advised by the Unit Coordinator


Return Date to Students

Week 7 Friday (9 Jan 2026)

Within two weeks of submissions


Weighting
30%

Assessment Criteria

Marking guide:

  • Accuracy of responses to knowledge and application items.
  • Correct interpretation of short scenarios (risk/policy/treatment).
  • Completion within the time limit and adherence to instructions.


Referencing Style

Submission

No submission method provided.


Submission Instructions
In your tutorial class or as advised by the Unit Coordinator

Learning Outcomes Assessed
  • Develop security policies and program for an organisations based on national and international standards and industry's best practice
  • Assess security risks and develop risk management strategies for an organisation
  • Justify appropriate risk treatment options
  • Integrate laws and ethics of information security management into the organisation's security framework.

2 Presentation

Assessment Title
Group

Task Description

Due: Week 8 (in your tutorial class or as advised by the Unit Coordinator).
Format: Team presentation (8–10 minutes plus 2 minutes for questions).


Task details:

In group of up to 4 students, you will present an Information Systems Security Policy (ISSP) based on Chapter 6 and informed by governance objectives (Chapter 2) and risk analysis (Chapters 3–4). Your presentation should explain the policy’s purpose and audience, justify key clauses with reference to standards, and show how the policy supports risk treatment decisions.

The ISSP must include elements such as:

  • Title, purpose, and rationale: a short statement of the policy’s aim, business need, and alignment to organisational governance and risk priorities.
  • Scope: Systems, data types, business units, locations, and roles to which the policy applies, including any third parties.
  • Acceptable use policy: Permitted behaviours and explicitly prohibited actions for organisational IT assets and data
  • Protection requirements for common services: Baseline technical and administrative controls for devices

Note. The complete ISSP template, exemplar, marking rubric, and submission instructions will be provided on the unit’s Moodle site.

Conditions: All team members must contribute. Citations must be shown on slides where external sources or textbook content is referenced.
Submission: PPT Slide uploaded to Moodle before your tutorial; delivery in class unless an online session is advised.
Feedback: Verbal summary in class plus rubric with brief comments in Moodle.


Assessment Due Date

Week 8 Monday (12 Jan 2026) 11:45 pm AEST

During your scheduled tutorial in week 8 or online as advised by the UC


Return Date to Students

Within 2 weeks of submission


Weighting
30%

Assessment Criteria

Marking guide:

  1. Policy quality and alignment (clear scope, roles, and enforceable clauses).
  2. Standards-informed justification (e.g., NIST/ISO mapping) and correct citation.
  3. Coherence and professionalism of delivery (structure, time management, slide clarity).
  4. Team contribution and ability to respond to questions.

The complete marking rubric, and submission instructions will be provided on the unit’s Moodle site.


Referencing Style

Submission

No submission method provided.


Submission Instructions
During your scheduled tutorial in week 8 or online as advised by the UC

Learning Outcomes Assessed
  • Develop security policies and program for an organisations based on national and international standards and industry's best practice
  • Apply appropriate security control mechanism to protect critical infrastructure
  • Integrate laws and ethics of information security management into the organisation's security framework.

3 Written Assessment

Assessment Title
Group

Task Description

Due: Week 12 (submit via Moodle by the published deadline).
Length/format: 2,500–3,000 words (excluding references and appendices), professional report style with headings.
Coverage: Weeks 1–11.


Task details:

Working in the same group, you will produce an integrated risk-management report for a given scenario. The report must include:

  1. Risk assessment (methods, risk statements, likelihood/impact)
  2. Risk treatment plan (options and rationale)
  3. Contingency/response planning,
  4. and a protection plan that maps selected controls to the identified risks.

Briefly indicate how the policy elements from Assessment 2 provide authority and governance for your proposed controls and processes.

Note. The complete Risk management template, marking rubric, and submission instructions will be provided on the unit’s Moodle site.


Conditions: Original group work; use proper citation where needed; submit to Turnitin via Moodle.
Feedback: Rubric with one per criterion-level comment and an overall summary may be provided if deemed necessary by the marker.


Assessment Due Date

Week 12 Friday (13 Feb 2026) 12:00 pm AEST

Online via Moodle


Return Date to Students

On grade certification date


Weighting
40%

Assessment Criteria

Marking guide:

  1. Problem definition and risk assessment quality (clear risk statements; appropriate method; correct prioritisation).
  2. Risk treatment and planning (defensible choices; traceability from risks to treatments; feasibility and resourcing).
  3. Protection mechanisms and assurance (controls mapped to risks; basic metrics/monitoring; linkage to policy/governance).
  4. Professional communication (structure, clarity, correct citation and referencing).

The complete marking rubric, and submission instructions will be provided on the unit’s Moodle site.


Referencing Style

Submission

No submission method provided.


Learning Outcomes Assessed
  • Apply appropriate security control mechanism to protect critical infrastructure
  • Assess security risks and develop risk management strategies for an organisation
  • Justify appropriate risk treatment options

Academic Integrity Statement

As a CQUniversity student you are expected to act honestly in all aspects of your academic work.

Any assessable work undertaken or submitted for review or assessment must be your own work. Assessable work is any type of work you do to meet the assessment requirements in the unit, including draft work submitted for review and feedback and final work to be assessed.

When you use the ideas, words or data of others in your assessment, you must thoroughly and clearly acknowledge the source of this information by using the correct referencing style for your unit. Using others’ work without proper acknowledgement may be considered a form of intellectual dishonesty.

Participating honestly, respectfully, responsibly, and fairly in your university study ensures the CQUniversity qualification you earn will be valued as a true indication of your individual academic achievement and will continue to receive the respect and recognition it deserves.

As a student, you are responsible for reading and following CQUniversity’s policies, including the Student Academic Integrity Policy and Procedure. This policy sets out CQUniversity’s expectations of you to act with integrity, examples of academic integrity breaches to avoid, the processes used to address alleged breaches of academic integrity, and potential penalties.

What is a breach of academic integrity?

A breach of academic integrity includes but is not limited to plagiarism, self-plagiarism, collusion, cheating, contract cheating, and academic misconduct. The Student Academic Integrity Policy and Procedure defines what these terms mean and gives examples.

Why is academic integrity important?

A breach of academic integrity may result in one or more penalties, including suspension or even expulsion from the University. It can also have negative implications for student visas and future enrolment at CQUniversity or elsewhere. Students who engage in contract cheating also risk being blackmailed by contract cheating services.

Where can I get assistance?

For academic advice and guidance, the Academic Learning Centre (ALC) can support you in becoming confident in completing assessments with integrity and of high standard.

What can you do to act with integrity?