Thank you for joining us on this short course on The Cyber Security Landscape. We hope that you enjoyed your learning experience. This short course is the introductory two-week course …
Welcome to our course on the cyber security landscape, where we will explore cyber security management and look at the risks facing individuals and organisations. Cyber attacks and threats are …
Every organisation needs to be prepared for risks so it is vital to have an effective risk management process. We need to first consider what risk management is. The Institute …
You have now read about four different cyber attacks that have happened in UK local government in recent years. Hopefully this has given you a chance to consider some of …
Having considered the risks and motives in previous steps, as well as your own experiences of cyber crime and cyber attacks, have a read of the following four case studies: …
Organisations should understand that cyber risks are inevitable and hence have to adopt a holistic approach to managing them. In addition to developing a robust IT infrastructure, care has to be …
Most organisations and businesses today rely on IT systems for storing company and client information. They invest heavily in secure IT infrastructure to protect these data assets. While there are …
Continuing our look into the impact of cyber crime the report by the Centre for Strategic and International Studies (CSIS) (Lewis 2018) gives a rather concerning insight into the rise …
In July 2019, the UK governmental Department for Digital, Culture, Media & Sport released its Cyber security breaches survey 2019 report, which ‘is a quantitative and qualitative survey of UK …
As the world embraces more digital and hyperconnected components, opportunities and paths become more numerous for attackers to gain access to our most sensitive information. Data breaches have become commonplace, …
So what is ransomware? For £5,000 I’ll tell you… That’s the key principle – it’s about holding information of value to you and only releasing this information in exchange for …
A cyber threat, or cyber security threat, is a malicious act that seeks to damage data, steal data, or disrupt digital life in general. Cyber threats are a big deal. …
“Nearly 9 out of 10 large organisations surveyed now suffer some form of security breach – suggesting that these incidents are now a near certainty. Businesses should ensure they are …
Courses in ExpertTracks may be assessed using either: Peer Graded Assignments, Tests, or a combination of both. Peer Graded Assignment steps have been designed specifically for ExpertTracks to provide you …
A growing number of entities that we interact with online collect and process our personal data, including online retailers, internet service providers, employers, banks, credit card companies, etc. Organisations use …