Postgraduate Programme and Module Handbook 2024-2025
Module FINN44215: Cybersecurity in Finance
Department: Finance
FINN44215: Cybersecurity in Finance
Type | Tied | Level | 4 | Credits | 15 | Availability | Available in 2024/2025 | Module Cap |
---|
Tied to | N3K109 |
---|---|
Tied to | N3K209 |
Tied to | N3K409 |
Tied to | N3K709 |
Tied to | N3K309 |
Tied to | N3KC09 |
Prerequisites
- None
Corequisites
- None
Excluded Combination of Modules
- None
Aims
- Provide students with a thorough understanding of cybersecurity principles and practices as they apply specifically to the financial sector and evolving threats.
- Familiarise students with the regulatory frameworks governing cybersecurity in the financial industry.
- Equip students with practical skills that they can apply in real-world scenarios within the financial sector; this includes hands-on experience in risk assessment, incident response planning and security architecture design.
- Students do not require any specific programming experience or cybersecurity management systems knowledge. This course will be self-contained in this respect and does not assume any prior knowledge.
Content
- Cybersecurity for Finance is a diverse, contemporary and evolving area for research and innovation. Therefore, specific lecture content will be updated with respect to current trends and the expertise of the module team. The following is an indicative list of potential topics:
- Overview of Cybersecurity and in particular Cybersecurity for financial services.
- Cybersecurity Regulations in Finance.
- Models of returns on information security and the difficulty of measurement.
- Incident response and strategies for recovery.
- Losses and cyber insurance.
- Financial innovation, Fintech and the evolution of security threats.
- Optimal risk management and security investment.
- Case studies on financial services and cyber security.
Learning Outcomes
Subject-specific Knowledge:
- By the end of the module, students should have a critical understanding of the principles and practice of some of the diverse set of cybersecurity regulations and compliance requirements applicable to financial institutions.
- Students will have explored, understood and appreciated the complexity and contradictions of the current academic literature and its implications for professional practice, and be able to identify open questions for their own research;
- Students will have demonstrated an ability to learn and work independently in this area, exercising critical judgement and discrimination in the resolution of complex problematic situations.
Subject-specific Skills:
- Written Communication;
- Planning and organizing;
- Problem solving and analysis;
- Initiative;
- Numeracy;
- Computer Literacy.
Key Skills:
- Cost benefit and insurance analysis.
- Group work.
- Cybersecurity threat modelling and strategy design.
Modes of Teaching, Learning and Assessment and how these contribute to the learning outcomes of the module
- Blended teaching model, with some in person lectures, video-based discussions and presentations.
- Synchronous class blended in person and virtual classrooms with group discussions and presentations.
- Seminar teaching in person or online with potentially asynchronous delivery.
- Flipped classroom using the prepared materials to deliver summaries of strategies, cybersecurity designs and their implementation.
Teaching Methods and Learning Hours
Activity | Number | Frequency | Duration | Total/Hours | |
---|---|---|---|---|---|
Lectures | 10 | 1 per week | 2 hours | 20 | |
Workshop | 4 | 1 hour | 4 | ■ | |
Preparation and Reading | 126 | ||||
Total | 150 |
Summative Assessment
Component: Assignment | Component Weighting: 100% | ||
---|---|---|---|
Element | Length / duration | Element Weighting | Resit Opportunity |
Assignment | 2500 words | 100% | same |
Formative Assessment:
In-class quizzes during practical sessions
■ Attendance at all activities marked with this symbol will be monitored. Students who fail to attend these activities, or to complete the summative or formative assessment specified above, will be subject to the procedures defined in the University's General Regulation V, and may be required to leave the University