Module Resources
Case study examples
Blackboard
Module Special Admissions Requirements
Must be enrolled on BSc (Hons) Intelligence and Security (Top-up)
Module Texts
Denning, D.E., Information Warfare and Security, Addison-Wesley, 2005. ISBN 978-0-201-43303-6
Gragido, W., Pirc, J., Elsevier Cybercrime and Espionage, An Analysis of Subversive Multivector Threats., 2011. ISBN 978-1-59749-613-1
A Strong Britain in an Age of Uncertainty The National Security Strategy http://www.direct.gov.uk/prod_consum_dg/groups/dg_digitalassets/@dg/@en/documents/-digitalasset/dg_191639.pdf?CID=PDF&PLA=furl&CRE=nationalsecuritystrategy
Skoudis E, Counter Hack Revisited: A Step by Step Guide to Computer Attacks and Effective defences, Prentice Hall
Szor, P., The Art of Computer Virus research and Defence, Addison Wesley, 2005, ISBN:0321304543
Zeltser, L., Skoidis, E., Stratton, W.O., Teal, H., Fighting Malicious Code, Prentice Hall
Module Learning Strategies
Students will have participated in an award induction workshop where they will learn how to use the Virtual Learning Environment (VLE) employed for the study of this module. Subsequently students will work through the module material provided on the VLE at a pace suggested within the VLE for the module. The material will include activities and review questions that allow students to assimilate the concepts and skills required by the module. Students will be encouraged to discuss relevant aspects within discussion forums that are part of the VLE. The forums will allow discussion with a student's peer group as well as the module tutor.
Google scholars, E-books, Research papers and journals will be used to support study on the module.
Use IM and VOIP applications (e.g. MSN , Skype) for individual contact/support.
Module Additional Assessment Details
Research based assignment 100% - Learning outcomes 1, 2, 3 & 4.
A 3000 word report detailing an investigation into a cyber warfare incident or malicious software attack
Module Indicative Content
- Information Warfare - The theory
- Offensive Information Warfare
* Psyops & Perceptions Management
* Seizing the signals
- Defensive Information Warfare
* Cryptography
* Vulnerability monitoring
* Incident handling
- Subversive Multivector Threats (SMT's)
* The rise of SMT's
* Seven commonalities of SMT's
- Cyber warfare - reality & myth. Issues, limits and potential
- Self-replicating and infecting software - structure/operation and techniques for attack detection, prevention and damage limitation.
- Software security testing Secure initialisation, validation, limit and error handling. Defences and tools - e.g. security scanners, file integrity checkers, application of cryptography, antivirus tools and techniques.
- Social engineering factors. Ethical and legal considerations.
- The potential for malicious software in intelligence gathering