Module Code: H8DGOV
Long Title Data Governance and Cybersecurity
Title Data Governance and Cybersecurity
Module Level: LEVEL 8
EQF Level: 6
EHEA Level: First Cycle
Credits: 10
Module Coordinator: Simon Caton
Module Author: Vikas Sahni
Departments: School of Business
Specifications of the qualifications and experience required of staff  
Learning Outcomes
On successful completion of this module the learner will be able to:
# Learning Outcome Description
LO1 Illustrate the key data lifecycle stages and reliance on these for effective information governance in real-world settings.
LO2 Explain in detail a broad range of core policy and legal aspects in data governance and compliance for financial applications.
LO3 Describe the requirements to ensure confidentiality, integrity and availability of information and systems.
LO4 Debate the key concepts of risk management and information technology resilience.
LO5 Debate the key concepts of risk management and information technology resilience.
Dependencies
Module Recommendations

This is prior learning (or a practical skill) that is required before enrolment on this module. While the prior learning is expressed as named NCI module(s) it also allows for learning (in another module or modules) which is equivalent to the learning specified in the named module(s).

No recommendations listed
Co-requisite Modules
No Co-requisite modules listed
Entry requirements  
 

Module Content & Assessment

Indicative Content
Cybersecurity Concepts
Protection of key assets including prioritization of people, processes and technology Key components of a cyber security programme
Data Lifecycle Management
Key stages and components of Data Lifecycle Management Regulatory & Privacy Components (including Data Protection Act)  Policies & Enforcement  Data Classification  Information Governance Reporting
Data Policy
Irish and EU Dimensions
Legal Aspects
Contract Law  e-Commerce Law  Data Protection Law Contemporary Legal Issues of Virtual Currencies, Blockchain, Financial Services and their Regulation (e.g. RegTech), FinTech Tax
Risk Assessment & Risk Management
Key Risks Management Components (e.g., ability to assess and measure risks) Risk Mitigation Techniques (e.g., reduce / mitigate, transfer, accept, etc.) Cost Benefit Analysis
Threats to Information & Data Processing Services
Understand the threat landscape  Typical Attack Methods and Threat Actors / Vectors  Impact of cyber-attacks and data breaches  Executive interactions and reporting
Information Security and Risk Management
Litigation and e-Discovery Cyber Risk management, cyber-criminal law Insurance and Cyber insurance  Fraud detection
Assessment Breakdown%
Coursework50.00%
End of Module Assessment50.00%

Assessments

Reassessment Requirement
Repeat examination
Reassessment of this module will consist of a repeat examination. It is possible that there will also be a requirement to be reassessed in a coursework element.

NCIRL reserves the right to alter the nature and timings of assessment

 

Module Workload

Module Target Workload Hours 0 Hours
Workload: Part Time
Workload Type Workload Description Hours Frequency Average Weekly Learner Workload
Lecture No Description 24 Every Week 24.00
Tutorial No Description 24 Every Week 24.00
Independent Learning No Description 202 Every Week 202.00
Total Weekly Contact Hours 48.00
 

Module Resources

Recommended Book Resources
  • Kelleher, Denis.. (2015), Privacy and Data Protection Law in Ireland, Bloomsbury Professional, [ISBN: 1780432038].
  • Taylor, Kevin. FinTech Law: A Guide to Technology Law in the Financial Services Industry., Bloomberg BNA, [ISBN: 1617464392.].
  • Jason Andress. The Basics of Information Security, Syngress, p.208, [ISBN: 1597496537].
Supplementary Book Resources
  • Corey Schou, Steven Hernandez ; technical editors, Flemming Faber, Jill Slay.. Information assurance handbook, ; McGraw-Hill Education, [ISBN: 0071821651].
  • Sivon et al.. (2014), Understanding FINTECH and Banking Law: A Practical Guide., Legal Works, [ISBN: 0314633596].
  • Carstensen, Jared, Bernard Golden and JP Morgenthal. (2012), Cloud Computing - Assessing the Risks, IT Governance Publishing, [ISBN: 1849283591].
This module does not have any article/paper resources
This module does not have any other resources
Discussion Note: