The [course_title] course analyses the concepts of cyber security from economics perspectives. The course focuses on the economic concepts, measurement approaches and data analytics so that you can take right security and IT decisions.
Apart from these, the course discusses other factors that shape the security decisions of other actors in the ecosystem of information goods and services. The course guides you the ways to uncover and handle the strategies employed by cyber hackers, attackers and defenders.
Assessment
This course does not involve any written exams. Students need to answer 5 assignment questions to complete the course, the answers will be in the form of written work in pdf or word. Students can write the answers in their own time. Each answer needs to be 200 words (1 Page). Once the answers are submitted, the tutor will check and assess the work.
Certification
Edukite courses are free to study. To successfully complete a course you must submit all the assignment of the course as part of assessment. Upon successful completion of a course, you can choose to make your achievement formal by obtaining your Certificate at a cost of £49.
Having an Official Edukite Certification is a great way to celebrate and share your success. You can:
- Add the certificate to your CV or resume and brighten up your career
- Show it to prove your success
Course Credit: Delft University of Technology
Course Curriculum
Getting Started | |||
Welcoming Video | 00:07:00 | ||
Introduction to Security Economics | |||
History of security economics | 00:08:00 | ||
An introduction to economics | 00:10:00 | ||
The economics of information goods | 00:13:00 | ||
Security from an economic perspective | 00:11:00 | ||
Measuring Cyber Security | |||
What to measure? | 00:09:00 | ||
How to measure the security level | 00:09:00 | ||
Metrics in practice | 00:09:00 | ||
Measuring incidents | 00:12:00 | ||
Security Investment and Management | |||
Security Strategies | 00:12:00 | ||
Optimal information security investment | 00:11:00 | ||
Risk management | 00:14:00 | ||
Operational security management | 00:15:00 | ||
Market Failures and Policy Interventions | |||
Market failures | 00:12:00 | ||
Policy Interventions | 00:13:00 | ||
Information sharing in incident response | 00:08:00 | ||
Payment card industry | 00:10:00 | ||
The Human Factor | |||
The behavioral economics of privacy | 00:12:00 | ||
The heuristics and biases tradition | 00:16:00 | ||
Consumer behavior and deception | 00:08:00 | ||
The behavioral economics of privacy | 00:12:00 | ||
Security economics and policy | 00:11:00 | ||
Assessment | |||
Submit Your Assignment | 00:00:00 | ||
Certification | 00:00:00 |
Course Reviews
No Reviews found for this course.