Enrolment options

Unlike many other fields in information systems management, successful cybersecurity management results in not much more than uneventful business operations. It is only when incidents or breaches occur that people truly recognize the importance of maintaining robust security infrastructure and practices.

While cybersecurity risks share similarities with other types of risks, they are quite different from the kind of dangers we encounter in everyday life, such as crossing a busy street. Will there ever come a time when people instinctively avoid cybersecurity risks, much like how we naturally try to avoid illness or physical accidents?

Despite the modern technologies we associate with “cybersecurity,” one could argue that some of its most basic ideas trace back to ancient Egypt. Additionally, familiar terms like “virus” and “Trojan horse” are borrowed from everyday language to describe cybersecurity concepts and threats. This suggests that cybersecurity can be understood from a human and social perspective, rather than solely through a technical or engineering lens.

With this in mind, a central objective of this course is to introduce students to the field of cybersecurity management in a way that is relatable to their personal lives and relevant to society and business practices. By highlighting the importance and some inner workings of cybersecurity, we discuss protection strategies based on our evaluation of risks and business concerns.

Guests cannot access this course. Please log in.