IT Security Governance

2025/2026

Content, progress and pedagogy of the module

In this project unit, the students must work with the relationships between technical, economic- political-, regulatory and cultural aspects of cyber security threats for individuals, companies, organizations and nations. The aim is that the students must understand the interplay between these aspects of cyber security and how precautions require solutions that include technical as well as political-regulatory and normative initiatives. Furthermore, the students must be able to operationalize knowledge on complex cyber security problems in managerial initiatives at strategic and tactical levels.

Learning objectives

Knowledge

Must have knowledge:

  • on problems within cyber security, that individuals, companies, organizations, public institutions and nations can encounter
  • on the interrelationships between technical, economic, political-regulatory and cultural aspects of threats against cyber security
  • on how the interplay between technical, political-regulatory and normative precautions can limit threats against cyber security
  • on legal requirements, standards and certification arrangements concerning cyber security at national and EU level respectively
  • on strategic and tactical management of cyber security within organizations, including norms for strengthening of the protection of personal data and cyber security
  • about the relation between security risks and business processes including the identification and protection of business-critical assets

Skills

Must have skills:

  • in detecting new risks and threats concerning cyber security within companies and other organizations
  • in being able to contribute to the development of methods to protect cyber security
  • in management of the prevention and control of threats against cyber security
  • in developing security strategies that include technical as well as normative aspects

Competences

Must have competences:

  • in being able to reflect on the ethical issues which the processing of sensitive personal data can involve
  • in understanding complex security problems
  • in communicating cyber security challenges and solutions to non-experts

Type of instruction

Types of instruction are listed at the start of ยง17; Structure and contents of the programme.

Exam

Exams

Name of examIT Security Governance
Type of exam
Oral exam based on a project
ECTS15
Assessment7-point grading scale
Type of gradingInternal examination
Criteria of assessmentThe criteria of assessment are stated in the Examination Policies and Procedures

Facts about the module

Danish titleGovernance af it-sikkerhed
Module codeESNCYSK3P2
Module typeProject
Duration1 semester
SemesterAutumn
ECTS15
Language of instructionEnglish
Empty-place SchemeYes
Location of the lectureCampus Copenhagen
Responsible for the module

Organisation

Education ownerMaster of Science (MSc) in Engineering (Cyber Security)
Study BoardStudy Board of Electronics and IT
DepartmentDepartment of Electronic Systems
FacultyThe Technical Faculty of IT and Design