Short Title: | Security Intelligence |
---|
Full Title: | Security Intelligence |
---|
Module Contributor: | Anthony Keane |
---|
Module Description: | Understand and explain how intelligence analysis is generated and used (or not) in decision making and what can be done to improve the positive influence on policy / decision makers. |
---|
Learning Outcomes: |
On successful completion of this module the learner will be able to |
- Identify and construct key aspects of intelligence behavior
- Critical review the stages in intelligence process/cycle
- Demonstrate critical thinking
- Analysis and appraise data/information
- Communicate intelligence output to decision makers
|
Module Content & Assessment
Indicative Content |
Introduction to course and overview What is intelligence, how is it managed, controlled and held accountable. The intelligence process/cycle. How intelligence can be used to reduce risk and uncertainty. How intelligence can be used to deal with traditiional and non-traditional threats.
|
Challenges and limitations of security intelligence The challenges and limitations of security intelligence will be investigated through a series of case studies.
|
Critical thinking Studies of the critical thinking process / how people think / how the brain works. How to use this information to inform decision makers.
|
Intelligence Cycle Critical review of the Intelligence processes and cycles, requirements, collection, analysis, dissemination, policy consumption, covert action.
|
Communications Data analysis / Reporting / Preparing briefs / Effective communicators
|
Data Science Data Science, Process and Procedures, Tools and Techniques.
|
Risk Assessment Business and Enterprise Threat Models, Cyber warfare, Government Policies, Legal issues, Ethical issues, Risk Assessment.
|
Indicative Assessment Breakdown | % |
Course Work Assessment % | 100.00% |
Course Work Assessment % |
Assessment Type |
Assessment Description |
Outcome addressed |
% of total |
Assessment Date |
Case study |
The student will analyse data from a case study and make recommendations to a decision maker. |
3,4,5 |
60.00 |
Week 10 |
Project |
The student will identify incidents and investigate how security intelligence has been used effectively and otherwise in real world situations. |
1,2,3,4 |
40.00 |
Week 6 |
No Final Exam Assessment % |
Indicative Reassessment Requirement |
---|
Coursework Only This module is reassessed solely on the basis of re-submitted coursework. There is no repeat written examination. |
ITB reserves the right to alter the nature and timings of assessment Indicative Module Workload & Resources
Indicative Workload: Full Time |
Frequency |
Indicative Average Weekly Learner Workload |
Every Week
| 30.00 |
Every Week
| 25.00 |
Every Week
| 45.00 |
Every Week
| 100.00 |
|
Resources |
---|
Recommended Book Resources |
---|
- Quing Li, Gregory Clark 2015, Security Intelligence: A Practitioner's Guide to Solving Enterprise Security Challenges, 1st Ed., Wiley [ISBN: 978-111889669]
- Scott E. Donaldson, Stanley G. Siegel, Chris K. Williams, Abdul Aslam 2015, Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against Advanced Threats, 1st Ed., APRESS [ISBN: 978-143026082]
| This module does not have any article/paper resources |
---|
This module does not have any other resources |
---|
Module Delivered in
|