Module Texts
Gollman, D. Computer Security, 2011, 3rd edition, Wiley, ISBN: 978-0470741153
Goodrich, M.T.,& R. Tamassia ,Introduction to Computer Security, 2013, Pearson, ISBN: 978-1292025407
International Organization for Standardization, ISO/IEC 27001:2013 - Information technology -- Security techniques -- Information security management systems -- Requirements".
Johnson, T.A., Cybersecurity: Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare, 2015, ISBN-13: 978-1-48223923-2
Kostopoulos, G.K., Cyberspace and Cybersecurity, 2013, ISBN-13: 978-1-4665-1758-5
Module Indicative Content
1. Introduction to Cryptography
2. Access Control (Identification, authentication, ownership, authorization, accountability,
vulnerability assessment, pen testing and threat modelling, access control models, access
control threats etc.)
3. Security Models & Practice ISO 27001, ISO 27002, COBIT, BS25999
4. Applications Security
5. Data Base Security
6. Authentication in Distributed Systems
7. Threats and Threat Analysis
8. Physical / Environmental Security
9. Security Architecture and Design (system security, virtual environment security, memory,
10. security models and architecture, database security etc)
11. Information Security Governance and Risk Management
12. Telecommunication and Network security
13. Operation Security (protecting assets, incident response, change management, system
hardening, trusted pats, auditing, monitoring and reporting)
14. Business Continuity and Disaster Recovery
Additional topics may be covered, where possible and appropriate. We will use examples from Linux and other modern operating systems to illustrate concepts covered through the course
Module Resources
You will need access to these resources:
The VLE
An ICT Workplace environment. Possibly suitable Networking equipment in the workplace. A Work-Based Learning Agreement will be completed for this module to ensure that the student will have access to the required resources in the workplace.
The Internet
Word Processing software for use in the coursework .
Staffordshire University has subscriptions to electronic book services such as Safari Tech Books, Ebrary and Netlibrary. There are titles in each of the collections that will support students studying this module. Staffordshire University has subscriptions to IEEExplore, ACM Digital Library, Elsevier Science Direct and Infotrac Computer Database all offering full text electronic access to journals and conference proceedings.
Module Special Admissions Requirements
Prior Study of Cyber Security Fundamentals and Computer Security Analysis and Penetration Testing
Module Additional Assessment Details
A single 3000-word report, based upon a practical case study. This report will, in part, contain some form of risk prevention/mitigation plan, based upon the analysis and evaluation of a given case study. This will be used to assess learning outcomes 1 to 6. (100% weighting) - Final Assessment.
Module Learning Strategies
Module Launch (30 hours)
There will be a module launch during which 20 hours of face to face contact will be devoted to undertaking tasks which are designed to provide useful insights into the module content and purpose.
Guided Learning (22 hours)
A module tutor who is part of the teaching team of the module will be allocated to you and you will meet them during the launch. Following the launch, there will be some materials on the VLE which are designed to guide your learning. Additionally, there will be at least two hour long sessions per week of contact time for the eleven weeks following the launch. This will be used for learning guided led by your module tutor. It will be a face to face presentation if you are on day release. For online learners it will be flipped classroom approach with group (up to 20) seminars.
Reviews:
• Tutorial reviews for online learners (1 hour per student)
Online learners will have 2 tutorial sessions with their module tutor during the course of the module. These will be individual or small group sessions during which your module tutor will be able to answer any queries that you have regarding module work. The review weeks are listed in the module handbook and mentors will be invited to join the call and provide feedback.
• Tutorial sessions for day release learners (at least 1 hour per student)
There will scheduled tutorial sessions (up to 20 students) during the 11 weeks following the launch which will take the place of the tutorial reviews for day release students
Independent learning (247 hours)
The module leader will provide resources through the virtual learning environment which will include videos and presentations as well as links to useful websites. Other academic learning will be achieved through reading around the subject area. Module tutors will suggest useful texts, though many others will be suitable and can be found in our e-library. If you require help understanding any of the concepts, you may contact your module tutor for assistance.
Part of your independent learning will take place in your workplace under the guidance of your mentor. You will complete a work-based learning agreement to ensure that arrangements are in place at your workplace to facilitate this work-based learning. You are encouraged to endeavour to apply your growing academic knowledge to improve your work practice and to reflect on your work-based experiences to improve your learning.
You will be required to complete assignment work during independent learning time. Assignment work for a 30 credit module at level 5 should take around 120 hours to complete
Additional help with learning
You will have access to the departmental librarian. As a student, you are more than welcome to visit the university at any time and to use the resources. During time at the university, you may arrange to meet your module tutor or academic coach for additional help.
Module Learning Outcomes
1. DEMONSTRATE A CRITICAL UNDERSTANDING AND CRITICALLY EVALUATE FUNDAMENTAL ASPECTS OF CYBER SECURITY
Knowledge & Understanding
Learning
Reflection
2. IDENTIFY RISKS TO THE SECURITY OF DATA, SYSTEMS AND NETWORKS
Enquiry
Learning
Analysis
3- CRITICALLY ANALYSE AND CRITICALLY EVALUATE THREATS TO DATA, SYSTEMS, NETWORKS AND BE ABLE TO PROVIDE A SOLUTION.
Analysis
Learning
Problem Solving
4- CRITICALLY ANALYSE THE PROCESS BY WHICH DISASTER RECOVERY AND RISK PREVENTION PLANS ARE DEVELOPED AND BE ABLE TO CRITICALLY EVALUATE SUCH PLANS
Learning
Analysis
Reflection
Communication
5. DEFINE AND JUSTIFY A USER ACCESS POLICY FOR AN INFORMATION SYSTEM GIVEN KNOWLEDGE OF THE SYSTEM ARCHITECTURE, SECURITY REQUIREMENTS AND THREAT/RISK ENVIRONMENT.
Learning
Analysis
6. PERFORM A BUSINESS IMPACT ANALYSIS IN RESPONSE TO A SECURITY INCIDENT
Analysis
Learning