Cyber Risk Management
For 3TU cyber security master and TUDelft TPM master specialisations.
(Image by TREsPASS project)
It appears that different programs/universities have different rules for handling exam results. The teaching and examination regulations of your own master program apply.
You are not allowed to bring any materials/papers to the exam. A reading guide for the literature is available. Please be aware that all of the papers and videos is exam material unless indicated otherwise.
For those who don't have access to Blackboard, the slides are available at this site (requires password).
- TUD students, please make sure you sign up for the mid-term exam in Osiris right now!
- In the lecture of September 14, you will be able to participate in an experiment on the understanding/use of CRM methods. Participation is anonymous and voluntary, and doesn't affect your course grade. Bring your laptop!
- Preparation for 18 September:
- Form groups of 4 for the assignment
- read the literature for lectures 1-2: Jones (2005) and Van den Berg et al. (2014)
- Preparation for 21 September:
- Submit your group's 3 preferred methods by e-mail
- Watch the two videos on the website (ComputerWeekly & George Cybenko), and answer the following questions:
- Why do the participants think that CRM is easy/possible/hard?
- Which concepts are unclear and why?
- What is needed to apply CRM in practice?
- Read the literature for lecture 3: Fenton and Neil (2012) and Cox Jr. (2009). Question for discussion: What are the best ways to explain risk and the associated effect of controls?