MACS H6020 - Security Intelligence

Short Title:Security Intelligence
Full Title:Security Intelligence
Module Code:MACS H6020
 
ECTS credits: 10
NFQ Level:9
Module Delivered in 2 programme(s)
Module Contributor:Anthony Keane
Module Description:Understand and explain how intelligence analysis is generated and used (or not) in decision making and what can be done to improve the positive influence on policy / decision makers.
Learning Outcomes:
On successful completion of this module the learner will be able to
  1. Identify and construct key aspects of intelligence behavior
  2. Critical review the stages in intelligence process/cycle
  3. Demonstrate critical thinking
  4. Analysis and appraise data/information
  5. Communicate intelligence output to decision makers
 

Module Content & Assessment

Indicative Content
Introduction to course and overview
What is intelligence, how is it managed, controlled and held accountable. The intelligence process/cycle. How intelligence can be used to reduce risk and uncertainty. How intelligence can be used to deal with traditiional and non-traditional threats.
Challenges and limitations of security intelligence
The challenges and limitations of security intelligence will be investigated through a series of case studies.
Critical thinking
Studies of the critical thinking process / how people think / how the brain works. How to use this information to inform decision makers.
Intelligence Cycle
Critical review of the Intelligence processes and cycles, requirements, collection, analysis, dissemination, policy consumption, covert action.
Communications
Data analysis / Reporting / Preparing briefs / Effective communicators
Data Science
Data Science, Process and Procedures, Tools and Techniques.
Risk Assessment
Business and Enterprise Threat Models, Cyber warfare, Government Policies, Legal issues, Ethical issues, Risk Assessment.
Indicative Assessment Breakdown%
Course Work Assessment %100.00%
Course Work Assessment %
Assessment Type Assessment Description Outcome addressed % of total Assessment Date
Case study The student will analyse data from a case study and make recommendations to a decision maker. 3,4,5 60.00 Week 10
Project The student will identify incidents and investigate how security intelligence has been used effectively and otherwise in real world situations. 1,2,3,4 40.00 Week 6
No Final Exam Assessment %
Indicative Reassessment Requirement
Coursework Only
This module is reassessed solely on the basis of re-submitted coursework. There is no repeat written examination.

ITB reserves the right to alter the nature and timings of assessment

 

Indicative Module Workload & Resources

Indicative Workload: Full Time
Frequency Indicative Average Weekly Learner Workload
Every Week 30.00
Every Week 25.00
Every Week 45.00
Every Week 100.00
Resources
Recommended Book Resources
  • Quing Li, Gregory Clark 2015, Security Intelligence: A Practitioner's Guide to Solving Enterprise Security Challenges, 1st Ed., Wiley [ISBN: 978-111889669]
  • Scott E. Donaldson, Stanley G. Siegel, Chris K. Williams, Abdul Aslam 2015, Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against Advanced Threats, 1st Ed., APRESS [ISBN: 978-143026082]
This module does not have any article/paper resources
This module does not have any other resources

Module Delivered in

Programme Code Programme Semester Delivery
BN_KMACS_R Master of Science in Computing in Applied Cyber Security 2 Elective
BN_KMACS_M Master of Science in Computing in Applied Cyber Security (Research) 1 Group Elective 3