| Long Title: | Data Governance and Cybersecurity |
| Language of Instruction: | English |
| Field of Study: |
Computer use
|
| Module Coordinator: |
Simon Caton |
| Module editor: |
Vikas Sahni |
| Teaching and Learning Strategy: |
This module will be taught using a mix of a traditional instructivist and constructivist approach. Teaching and learning will take place primarily through theoretical material, practical workbooks, on-going formative assessment and case studies. The teaching and learning strategy will be applied in nature and
lectures will focus on the understanding and application of knowledge in a practical and applied manner
utilising a problem based learning approach. Participants will be guided towards suitable online supporting material including videos and interactive textbook exercises (including MCQs, critical thinking questions, discussion questions, etc.) to support a constructivist approach.
|
| Learning Environment: |
Learning will take place in classroom or lab environments as appropriate. In lab environments, each student will have access to IT resources. Learners will have access to library resources and to faculty outside of the classroom where required. Module materials will be placed on Moodle, the colleges LMS. |
| Module Description: |
The Cybersecurity and Governance module is motivated around bridging the knowledge gap surrounding security and data governance. Thus the motivation to include the module in the programme suite is to tailor more T-shaped graduates; i.e., those that comprehend foundational elements of FinTech in
conjunction with the security risks, security measures, and information practices needed for the successful implementation of real-world problems. The data governance aspects of the module recognise the transformational impact of regulation and compliance on the industry as noted in the IFS 2020 Vision Document. |
| Learning Outcomes |
| On successful completion of this module the learner will be able to: |
| LO1 |
Illustrate the key data lifecycle stages and reliance on these for effective information governance in
real-world settings. |
| LO2 |
Explain in detail a broad range of core policy and legal aspects in data governance and compliance
for financial applications. |
| LO3 |
Describe the requirements to ensure confidentiality, integrity and availability of information and
systems. |
| LO4 |
Debate the key concepts of risk management and information technology resilience. |
| LO5 |
Debate the key concepts of risk management and information technology resilience. |
| Pre-requisite learning |
Module Recommendations
This is prior learning (or a practical skill) that is required before enrolment on this module. While the prior learning is expressed as named NCI module(s) it also allows for learning (in another module or modules) which is equivalent to the learning specified in the named module(s).
|
| No recommendations listed |
Requirements
This is prior learning (or a practical skill) that is mandatory before enrolment in this module is allowed. You may not enrol on this module if you have not acquired the learning specified in this section.
|
| No requirements listed |
Module Content & Assessment
| Indicative Content |
|
Cybersecurity Concepts
Protection of key assets including prioritization of people, processes and technology
Key components of a cyber security programme
|
|
Data Lifecycle Management
Key stages and components of Data Lifecycle Management
Regulatory & Privacy Components (including Data Protection Act)
Policies & Enforcement
Data Classification
Information Governance Reporting
|
|
Data Policy
Irish and EU Dimensions
|
|
Legal Aspects
Contract Law
e-Commerce Law
Data Protection Law
Contemporary Legal Issues of Virtual Currencies, Blockchain, Financial Services and their Regulation (e.g. RegTech), FinTech Tax
|
|
Risk Assessment & Risk Management
Key Risks Management Components (e.g., ability to assess and measure risks)
Risk Mitigation Techniques (e.g., reduce / mitigate, transfer, accept, etc.)
Cost Benefit Analysis
|
|
Threats to Information & Data Processing Services
Understand the threat landscape
Typical Attack Methods and Threat Actors / Vectors
Impact of cyber-attacks and data breaches
Executive interactions and reporting
|
|
Information Security and Risk Management
Litigation and e-Discovery
Cyber Risk management, cyber-criminal law
Insurance and Cyber insurance
Fraud detection
|
| Assessment Breakdown | % |
| Coursework | 50.00% |
| End of Module Assessment | 50.00% |
| Reassessment Requirement |
Repeat examination
Reassessment of this module will consist of a repeat examination. It is possible that there will also be a requirement to be reassessed in a coursework element.
|
Reassessment Description Should learners not achieve a 40% pass mark, they will either sit a repeat terminal exam, or undertake an assessment that assesses all learning outcomes.
|
NCIRL reserves the right to alter the nature and timings of assessment
Module Workload
| This module has no Full Time workload. |
| Workload: Part Time |
| Workload Type |
Workload Description |
Hours |
Frequency |
Average Weekly Learner Workload |
| Lecture |
No Description |
24 |
Every Week |
24.00 |
| Tutorial |
No Description |
24 |
Every Week |
24.00 |
| Independent Learning |
No Description |
202 |
Every Week |
202.00 |
| Total Hours |
250.00 |
| Total Weekly Learner Workload |
250.00 |
| Total Weekly Contact Hours |
48.00 |
Module Resources
| Recommended Book Resources |
|---|
- Kelleher, Denis. 2015, Privacy and Data Protection Law in Ireland, Bloomsbury Professional [ISBN: 1780432038]
- Taylor, Kevin, FinTech Law: A Guide to Technology Law in the Financial Services Industry., Bloomberg BNA [ISBN: 1617464392.]
- Jason Andress, The Basics of Information Security, Syngress [ISBN: 1597496537]
| | Supplementary Book Resources |
|---|
- Corey Schou, Steven Hernandez ; technical editors, Flemming Faber, Jill Slay., Information assurance handbook, ; McGraw-Hill Education [ISBN: 0071821651]
- Sivon et al. 2014, Understanding FINTECH and Banking Law: A Practical Guide., Legal Works [ISBN: 0314633596]
- Carstensen, Jared, Bernard Golden and JP Morgenthal 2012, Cloud Computing - Assessing the Risks, IT Governance Publishing [ISBN: 1849283591]
| | This module does not have any article/paper resources |
|---|
| This module does not have any other resources |
|---|
Module Delivered in
| Programme Code |
Programme |
Semester |
Delivery |
| HDFINTECH |
HDip FinTech |
1 |
Core Subject |
|