Unit rationale, description and aim

In an increasingly digital world, the ability to safeguard information and systems is critical to professional success and societal resilience. This unit provides students with essential knowledge of cybersecurity principles and their strategic importance in contemporary organisations. It explores the evolving landscape of security threats, risk assessment, and risk management strategies, emphasising their impact on business continuity and organisational reputation.

Students will examine foundational cybersecurity concepts, industry-standard frameworks, and the governance structures that underpin secure information systems. The unit also addresses the ethical, social, and legal dimensions of cybersecurity, highlighting how regulatory compliance, corporate responsibility, and stakeholder trust intersect in the digital domain.

The aim of this unit is to equip future business leaders with the critical understanding needed to oversee cybersecurity risks, make informed strategic decisions, and foster a culture of security within their organisations.

2026 10

Campus offering

No unit offerings are currently available for this unit.

Prerequisites

Nil

Incompatible

ITEC640 Information Systems Security , ITEC614 Cyber Security Concepts

Learning outcomes

To successfully complete this unit you will be able to demonstrate you have achieved the learning outcomes (LO) detailed in the below table.

Each outcome is informed by a number of graduate capabilities (GC) to ensure your work in this, and every unit, is part of a larger goal of graduating from ACU with the attributes of insight, empathy, imagination and impact.

Explore the graduate capabilities.

Synthetise knowledge of vulnerabilities and potent...

Learning Outcome 01

Synthetise knowledge of vulnerabilities and potential security threats to information systems and analyse their consequences in real world scenarios in collaboration with peers
Relevant Graduate Capabilities: GC1, GC9

Critically evaluate the consequences of security t...

Learning Outcome 02

Critically evaluate the consequences of security threats in an organisation and propose appropriate security countermeasures to minimise the impacts or likelihood of risks.
Relevant Graduate Capabilities: GC1, GC7

Appraise the impact of cyber security threats acro...

Learning Outcome 03

Appraise the impact of cyber security threats across societies and national borders
Relevant Graduate Capabilities: GC1, GC10

Content

Topics will include:

  • Introduction to cyber security
  • Threats, vulnerabilities, attacks
  • Protecting secrets
  • Risk assessment and management
  • Ensuring Integrity
  • Access control
  • Legal, privacy and ethical issues
  • Impacts of cyber attacks

Assessment strategy and rationale

A range of assessment procedures will be used to meet the unit learning outcomes and develop graduate attributes consistent with University assessment requirements. The first assessment requires students to critically analyse a recent security breach and investigate the cause of breach and will also apply their knowledge to propose an appropriate security solution.  The second assessment involves preparing a strategic cybersecurity risk assessment and policy brief for a chosen organisation. It provides students with an opportunity to apply theoretical knowledge and assess risk for a cyber physical system using standard risk analysis models.

To pass this unit, students must achieve an aggregate mark of at least 50%. Marking will be in accordance with a rubric specifically developed to measure students’ level of achievement of the learning outcomes for each item of assessment. Students will be awarded a final grade which signifies their overall achievement in the unit.

Overview of assessments

Task 1: Strategic Analysis of a Recent Data ...

Task 1: Strategic Analysis of a Recent Data Breach

The purpose of this task is to develop students’ analytical, evaluative, and strategic decision-making capabilities for managing cybersecurity risks at an executive level.

Students will investigate a major recent cyber-attack or data breach affecting a national or multinational organisation. They will:

  • Synthesise knowledge of the vulnerabilities and security threats that contributed to the breach and analyse their consequences for the organisation's operations, finances, and reputation 
  • Critically evaluate the organisation's response strategies, risk management approaches, and governance processes, and propose alternative or improved countermeasures 
  • Appraise the broader social, ethical, and regulatory implications of the breach, including cross-border legal challenges, data sovereignty concerns, and societal trust issues: 

Submission Type: Individual

Assessment Method: Recorded presentation

Artefact: Presentation Slides (ppt) + 20 minutes recorded presentation.

Weighting

45%

Learning Outcomes LO1, LO2, LO3
Graduate Capabilities GC1, GC7, GC9, GC10

Task 2: Cybersecurity Risk Assessment and Strateg...

Task 2: Cybersecurity Risk Assessment and Strategy Brief

Students will prepare a strategic briefing for the executive

board of an organisation. They will:

  • Identify and synthesise key vulnerabilities and emerging security threats relevant to the organisation, and analyse their possible consequences in real-world operational scenarios 
  • Evaluate organisational risks using appropriate risk assessment frameworks (e.g. STRIDE, DREAD or other business-oriented frameworks), and recommend evidence-based countermeasures to minimise their likelihood or impact 
  • Appraise the wider ethical, legal, and societal implications of the recommended strategies, especially in cross-border or multinational contexts 

Submission Type: Individual

Assessment Method: Recorded presentation

Artefact: Presentation Slides (ppt) + 25 minutes recorded presentation.

Weighting

55%

Learning Outcomes LO1, LO2, LO3
Graduate Capabilities GC1, GC7, GC9, GC10

Learning and teaching strategy and rationale

Teaching and Learning Approach

Applied practice and active engagement are central to learning in accounting. Students are expected to adopt an active learning strategy, developing their skills and knowledge by doing. ACU’s teaching approach emphasises learning outcomes in knowledge, capabilities, and professional readiness. It encourages students to be active participants while recognising that learning involves both active and receptive processes, constructing meaning for oneself, and learning collaboratively. ACU promotes autonomous and self-motivated learning that is critical, reflective, and focused on mastering content and skills.

Representative texts and references

Representative texts and references

Stallings, W., & Brown, L. (2023). Computer security: Principles and practice (5th ed.). Pearson Education.

Whitman, M. E., & Mattord, H. J. (2020). Principles of information security (7th ed.). Cengage Learning.

Anderson, R 2020, Security Engineering: A Guide to Building Dependable Distributed Systems, 3rd edn, Wiley.

Stallings, W. (2023). Cryptography & network security: Principles and practice (8th ed., Global ed.). Pearson Education.

Cornish, P. (Ed.). (2021). The Oxford handbook of cyber security. Oxford University Press.

Manjikian, M. (2022). Cybersecurity ethics: An introduction (2nd ed.). Routledge.

Brumfield, C., & Haugli, B. (2022). Cybersecurity risk management: Mastering the fundamentals using the NIST cybersecurity framework. Wiley.

Hasib, M. (2022). Cybersecurity leadership: Powering the modern organization. Tomorrow’s Strategy Today.

Romaniuk, S. N., & Manjikian, M. (Eds.). (2021). Routledge companion to global cyber-security strategy. Routledge.

Singh, R., & Marinos, L. (2024). Cybersecurity: Technology and governance. Springer.


Locations
Credit points
Year

Have a question?

We're available 9am–5pm AEDT,
Monday to Friday

If you’ve got a question, our AskACU team has you covered. You can search FAQs, text us, email, live chat, call – whatever works for you.

Live chat with us now

Chat to our team for real-time
answers to your questions.

Launch live chat

Visit our FAQs page

Find answers to some commonly
asked questions.

See our FAQs