INDICATIVE CONTENT
Key concepts of computer security (Conditionality, Integrity, Availability)
¿ Security Models
¿ Risk Assessment
¿ An overview on cryptography
¿ Access Control
¿ Authentication and Authorisation
¿ Common attacks and defences on computer systems
¿ Basic concept of firewalls
¿ Basic concept of intrusion detection
¿ Malicious code: viruses, worms, trojan horses
We will use examples from Linux and other modern operating systems to illustrate concepts covered through the course
ADDITIONAL ASSESSMENT DETAILS
A coursework (portfolio/assignment) of 3000 words weighted at 100% assessing all learning outcomes.
Portfolio will include a security risk assessment.
LEARNING STRATEGIES
Module Launch (1 hour)
There will be a module launch during which 1 hour of face-to-face contact will be devoted to tasks which are designed to provide useful insights into the module content and purpose.
Online class-based sessions (17 hours)
There are 17 hours of class related teaching delivery presented online, which will include lectures and practical skills development.
Assessment surgeries (2 hours)
To help students develop the assessment there will be two 1-hour surgeries where students can show and discuss their progress for tutor feedback.
Independent Learning (180 hours)
The tutor will provide resources through the virtual learning environment which will include videos and presentations as well as links to useful websites. Other academic learning will be achieved through reading around the subject area. The tutor will suggest useful texts, though many others will be suitable and can be found in our e-library. If you require help understanding any of the concepts, you may contact the tutor for assistance.
LEARNING OUTCOMES
1.UNDERTAKE SECURITY RISK ASSESSMENT FOR A SIMPLE IT SYSTEM AND PROPOSE RESOLUTION ADVICE.
Communication
Knowledge & Understanding
Learning
2.IDENTIFY, ANALYSE AND EVALUATE SECURITY THREATS AND HAZARDS TO PLANNED AND INSTALLED INFORMATION SYSTEMS OR SERVICES (E.G. CLOUD SERVICES).
Application
Enquiry
Knowledge & Understanding
3.UNDERSTAND THE BASIC CONCEPTS IN INFORMATION SECURITY, INCLUDING SECURITY POLICIES, SECURITY MODELS, AND SECURITY MECHANISMS.
Communication
Knowledge & Understanding
Problem Solving
4.UNDERSTAND THE TOOLS AND TECHNIQUES USED BY DEFENCE TO PROTECT COMPUTER SYSTEMS.
Application
Problem Solving
RESOURCES
You will need access to these resources:
Microsoft Teams
Blackboard VLE
Library
TEXTS
Swanson, C. (2020) Professional Security Management: A strategic Guide. Routledge. ISBN-10: 0367339617, ISBN-13: 978-0367339616
Franke, D. (2016) Cyber Security Basics, CreateSpace, ISBN: 9781522952190
Zhang, N. (2019) Cyber Security: The beginners Guide to Learning the Basics of Information Security and Modern Cyber Threats, independently published. ISBN-10: 1698238533, ISBN-13: 978-1698238531
Du, W. (2017) Computer Security: A Hands-on Approach. CreateSpace Independent Publishing Platform. ISBN-10: 154836794X, ISBN-13: 978-1548367947
HM Government, The UK Cyber Security Strategy Protecting and promoting the UK in a digital world, https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/60961/uk-cyber-security-strategy-final.pd
International Organization for Standardization, ISO/IEC 27001:2013 - Information technology -- Security techniques -- Information security management systems -- Requirements". (Last reviewed 2019) Johnson, T.A., Cybersecurity: Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare, 2015, ISBN-13: 978-1-48223923-2
McNab, C. (2016). Network Security Assessment: Know Your Network 3rd Edition, O’Reilly. ISBN-10: 149191095X, ISBN-13: 978-1491910955
McMillan, T. (2018), CCNA Security Study Guide: Exam 210-260 2nd ed. Edition, Sybex. ISBN-10: 1119409934, ISBN-13: 978-1119409939Campbell, A. (2016) Practical Information Security Management: A Complete Guide to Planning & Implementation, 2016, Apress, ISBN-10: 9781484216842, ISBN-13: 978-1484216842