Teaching Information Security Management Using an Incident of Intellectual Property Leakage

03/27/2021
by   Atif Ahmad, et al.
0

Case-based learning is a powerful pedagogical method of creating dialogue between theory and practice. CBL is particularly suited to executive learning as it instigates critical discussion and draws out relevant experiences. In this paper we used a real-world case to teach Information Security Management to students in Management Information Systems. The real-world case is described in a legal indictment, T-mobile USA Inc v Huawei Device USA Inc. and Huawei Technologies Co. LTD, alleging theft of intellectual property and breaches of contract concerning confidentiality and disclosure of sensitive information. The incident scenario is interesting as it relates to a business asset that has both digital and physical components that has been compromised through an unconventional cyber-physical attack facilitated by insiders. The scenario sparked an interesting debate among students about the scope and definition of security incidents, the role and structure of the security unit, the utility of compliance-based approaches to security, and the inadequate use of threat intelligence in modern security strategies.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
03/27/2021

Teaching Information Security Management in Postgraduate Tertiary Education: The Case of Horizon Automotive Industries

Teaching cases based on stories about real organizations are a powerful ...
research
05/10/2021

EPICTWIN: An Electric Power Digital Twin for Cyber Security Testing, Research and Education

Cyber-Physical Systems (CPS) rely on advanced communication and control ...
research
05/19/2021

Securing Cyber-Physical Systems Through Blockchain-Based Digital Twins and Threat Intelligence

The proliferation of digitization and complexity of connectivity in Cybe...
research
05/27/2021

Security and Privacy in the Emerging Cyber-Physical World: A Survey

With the emergence of low-cost smart and connected IoT devices, the area...
research
02/25/2022

'Cyber security is a dark art': The CISO as soothsayer

Commercial organisations continue to face a growing and evolving threat ...
research
06/03/2020

Implementation of password manager with sram-based physical unclonable function

Hacking password databases is one of the most frequently reported cyber-...
research
12/21/2017

Acoustic Denial of Service Attacks on HDDs

Among storage components, hard disk drives (HDDs) have become the most c...

Please sign up or login with your details

Forgot password? Click here to reset