Students

ACCG3025 – Cyber Security and Privacy

2025 – Session 2, In person-scheduled-weekday, North Ryde

General Information

Download as PDF
Unit convenor and teaching staff Unit convenor and teaching staff
Mauricio Marrone
See iLearn for consultation hours
Credit points Credit points
10
Prerequisites Prerequisites
130cp at 1000 level or above
Corequisites Corequisites
Co-badged status Co-badged status
Unit description Unit description

Cyber-security and privacy are two of the biggest issues facing businesses operating in the Information Age. This unit explores how businesses both face and respond to such threats and opportunities as they integrate the Internet into their existing operations and new products/technologies in Australia and internationally. This unit is designed to give students practical skills to identify and mitigate those cyber-security and privacy risks, and to resolve legal disputes that may emerge from them, whether as a manager, an employee, or as an external consultant.

Important Academic Dates

Information about important academic dates including deadlines for withdrawing from units are available at https://www.mq.edu.au/study/calendar-of-dates

Learning Outcomes

On successful completion of this unit, you will be able to:

  • ULO1: Identify and synthesise cybersecurity risks facing modern businesses
  • ULO2: Analyse practical implications of different theories about privacy and governance strategies necessary for effective business leadership both before and after a cyber-attack
  • ULO3: Apply Australian and foreign laws and ethics to determine how businesses can build trust through managing personal information and confidential business information
  • ULO4: Evaluate privacy risks through applying Privacy Impact Assessment methodologies for existing and new products/processes within a business

General Assessment Information

Late Assessment Submission Penalty (written assessments) 

 

Unless a Special Consideration request has been submitted and approved, a 5% penalty (of the total possible mark) will be applied each day a written assessment is not submitted, up until the 7th day (including weekends). After the 7th day, a grade of ‘0’ will be awarded even if the assessment is submitted. Submission time for all written assessments is set at 11.55pm. A 1-hour grace period is provided to students who experience a technical concern.  

 

For any late submissions of time-sensitive tasks, such as scheduled tests/exams, performance assessments/presentations, and/or scheduled practical assessments/labs, students need to submit an application for Special Consideration.

 

Assessment Tasks

Name Weighting Hurdle Due
Professional Practice: Cybersecurity Breach Response Report 40% No Sunday 5th October, Presentations - Week 9, Week 10
Skills Development: Persuasive Presentation 20% No Week 10, Week 11
Professional Practice: Privacy Impact Assessment Report 40% No 07/11/2025

Professional Practice: Cybersecurity Breach Response Report

Assessment Type 1: Presentation
Indicative Time on Task 2: 35 hours
Due: Sunday 5th October, Presentations - Week 9, Week 10
Weighting: 40%

 

The purpose of this assessment is for you to develop your strategic communication and incident response skills by simulating the role of a Chief Information Security Officer (CISO) responding to a critical cybersecurity breach.

You will investigate the causes and vulnerabilities that contributed to the cybersecurity breach, evaluate its operational and reputational impact, and develop a strategic response plan.

Skills in focus:

  • Communication
  • Work readiness
  • Critical thinking and problem solving
  • Discipline knowledge

Deliverable: 5–10 minute presentation (delivered during tutorial) and 2,500-word report

Individual assessment

 


On successful completion you will be able to:
  • Identify and synthesise cybersecurity risks facing modern businesses
  • Analyse practical implications of different theories about privacy and governance strategies necessary for effective business leadership both before and after a cyber-attack
  • Apply Australian and foreign laws and ethics to determine how businesses can build trust through managing personal information and confidential business information

Skills Development: Persuasive Presentation

Assessment Type 1: Presentation
Indicative Time on Task 2: 20 hours
Due: Week 10, Week 11
Weighting: 20%

 

The purpose of this assessment is for you to develop your critical analysis and persuasive communication skills by engaging with a contemporary business privacy challenge.

You will research a privacy business problem, develop compelling arguments for your assigned position by creating a 5 minute video presentation of your arguments, and then prepare a rebuttal to an opposing view after being paired with your peer.

Skills in focus:

  • Communication and collaboration
  • Critical thinking and problem solving
  • Global, Ethical, and environmental citizenship

Deliverable: Video presentation (5 mins) and rebuttal (individual)

Individual assessment

 


On successful completion you will be able to:
  • Analyse practical implications of different theories about privacy and governance strategies necessary for effective business leadership both before and after a cyber-attack
  • Apply Australian and foreign laws and ethics to determine how businesses can build trust through managing personal information and confidential business information

Professional Practice: Privacy Impact Assessment Report

Assessment Type 1: Report
Indicative Time on Task 2: 35 hours
Due: 07/11/2025
Weighting: 40%

 

The purpose of this assessment is for you to evaluate privacy risks associated with new business initiatives in alignment with relevant regulations and industry best practices.

You will conduct a privacy impact assessment for a proposed business activity, analysing privacy legislation, mapping data flows, identifying vulnerabilities, assessing risks, and recommending mitigation strategies that balance compliance with business goals.

Skills in focus:

  • Work readiness
  • Critical thinking and problem solving
  • Global, ethical, and environmental citizenship
  • Discipline knowledge

Deliverable: 2,500-word professional privacy impact assessment report

Individual assessment

 


On successful completion you will be able to:
  • Identify and synthesise cybersecurity risks facing modern businesses
  • Analyse practical implications of different theories about privacy and governance strategies necessary for effective business leadership both before and after a cyber-attack
  • Apply Australian and foreign laws and ethics to determine how businesses can build trust through managing personal information and confidential business information
  • Evaluate privacy risks through applying Privacy Impact Assessment methodologies for existing and new products/processes within a business

1 If you need help with your assignment, please contact:

  • the academic teaching staff in your unit for guidance in understanding or completing this type of assessment
  • the Writing Centre for academic skills support.

2 Indicative time-on-task is an estimate of the time required for completion of the assessment task and is subject to individual variation

Delivery and Resources

Required Text: Required Texts: As Cyber Security and Privacy are fast-moving topics, a textbook will likely be significantly outdated by the time it reaches print. Consequently, there will be no prescribed textbook. 
Unit Web Page: Available on iLearn
Technology Used and Required: Students will require access to a computer and the Internet to undertake research and prepare their answers for their assessment tasks. You will need a mobile phone with a camera (or equivalent) to record your debate videos.
Delivery format and other details:

Lectures: To make the best use of our face-to-face time, each class will be divided into two parts. The theoretical component will be delivered as pre-recorded online lectures, which you are required to watch before coming to class. Our face-to-face sessions will be dedicated to practical work, where we will apply the concepts covered in the online lectures. Please ensure you have watched the relevant theoretical lecture prior to attending the practical session (see the timetable).

 

The timetable for classes can be found on the University website at: http://timetables.mq.edu.au

Students must attend the tutorial in which they are enrolled and may not change tutorials without the prior permission of the course convenor.

Recommended Readings:

There are many cybersecurity and privacy sources of information online. A few worth looking at include:

  • SecurityAffairs: http://securityaffairs.co/wordpress/
  • Krebs on Security: https://krebsonsecurity.com/
Other Course Materials: Will be made available on iLearn

Workload:

This unit comprises 13 weekly lectures and 12 tutorials (no tutorial in week 1). Many tutorials will require active participation in small group exercises.

Unit Schedule

The schedule below is indicative of the topics we will cover.

Week Lecture Topic
1 Cyber-security and privacy
2 Exploits and defenses
3 Motives, Methods and Malicious Minds
4 Identifying risks, frameworks and tools
5 Responding to Cyber-security attacks
6 Business roles involvement in minimising cyber-security issues
7 Obligations and safeguarding the digital domain
Break  
8 READING WEEK (NO LECTURE)
9 Privacy in Australia
10 Assessing privacy compliance in businesses
11 Assessing privacy risks in new technologies/businesses
12 Guest Lecturer - Contemporary cyber-security topics
13 Course Review: Engaging with the inherent tensions between cyber-security and privacy

Policies and Procedures

Macquarie University policies and procedures are accessible from Policy Central (https://policies.mq.edu.au). Students should be aware of the following policies in particular with regard to Learning and Teaching:

Students seeking more policy resources can visit Student Policies (https://students.mq.edu.au/support/study/policies). It is your one-stop-shop for the key policies you need to know about throughout your undergraduate student journey.

To find other policies relating to Teaching and Learning, visit Policy Central (https://policies.mq.edu.au) and use the search tool.

Student Code of Conduct

Macquarie University students have a responsibility to be familiar with the Student Code of Conduct: https://students.mq.edu.au/admin/other-resources/student-conduct

Results

Results published on platform other than eStudent, (eg. iLearn, Coursera etc.) or released directly by your Unit Convenor, are not confirmed as they are subject to final approval by the University. Once approved, final results will be sent to your student email address and will be made available in eStudent. For more information visit connect.mq.edu.au or if you are a Global MBA student contact globalmba.support@mq.edu.au

Academic Integrity

At Macquarie, we believe academic integrity – honesty, respect, trust, responsibility, fairness and courage – is at the core of learning, teaching and research. We recognise that meeting the expectations required to complete your assessments can be challenging. So, we offer you a range of resources and services to help you reach your potential, including free online writing and maths support, academic skills development and wellbeing consultations.

Student Support

Macquarie University provides a range of support services for students. For details, visit http://students.mq.edu.au/support/

Academic Success

Academic Success provides resources to develop your English language proficiency, academic writing, and communication skills.

The Library provides online and face to face support to help you find and use relevant information resources. 

Student Services and Support

Macquarie University offers a range of Student Support Services including:

Student Enquiries

Got a question? Ask us via the Service Connect Portal, or contact Service Connect.

IT Help

For help with University computer systems and technology, visit http://www.mq.edu.au/about_us/offices_and_units/information_technology/help/

When using the University's IT, you must adhere to the Acceptable Use of IT Resources Policy. The policy applies to all who connect to the MQ network including students.


Unit information based on version 2025.02 of the Handbook