Program Overview
Introduction to ITC568 Cloud Privacy and Security
ITC568 Cloud Privacy and Security is a subject that focuses on issues surrounding cloud computing privacy and security and their application to business. It discusses the governance framework that must underpin and define the processes for determining risk, privacy, and security issues for an enterprise that uses a cloud model.
Subject Outlines
The subject examines the legal and business requirements for privacy, the need for a risk management assessment of all data used in cloud operations, and the use of security controls to manage the assessed risk. It further examines the major cloud deployment and delivery models to determine how these affect the risk management assessment and subsequent security controls when applied to business.
Availability
The subject is available in Session 2, with 60 students on campus at CSU Study Centre Brisbane and CSU Study Centre Melbourne, and online at Bathurst Campus.
Subject Information
Grading System
The grading system for this subject is HD/FL.
Duration
The duration of this subject is one session.
School
The subject is offered by the School of Computing and Mathematics.
Enrolment Restrictions
The subject is only available to postgraduate students.
Assumed Knowledge
The assumed knowledge for this subject is ITC561 Cloud Computing.
Learning Outcomes
Upon successful completion of this subject, students should be able to:
- examine the legal, business, and privacy requirements for a cloud deployment model
- evaluate the risk management requirements for a cloud deployment model
- critically analyse the legal, ethical, and business concerns for the security and privacy of data to be deployed to the cloud
- develop and present a series of proposed security controls to manage the security and privacy of data deployed to the cloud
- develop and present a cloud governance framework to underpin the cloud operations for an enterprise
Syllabus
The subject will cover the following topics:
- Governance and auditing for cloud operations
- Threats, risk, and requirements landscape
- Privacy, data, and digital identity
- Data sensitivity, location, and legal jurisdiction
- Cloud security approaches and challenges
