Module Descriptors
ADVANCED CYBER SECURITY
COCS60717
Key Facts
Digital, Technology, Innovation and Business
Level 6
30 credits
Contact
Leader: Mostafa Tajdini
Hours of Study
Scheduled Learning and Teaching Activities: 52
Independent Study Hours: 248
Total Learning Hours: 300
Assessment
  • REPORT (6000 WORDS) weighted at 100%
Module Details
INDICATIVE CONTENT
Advanced Concepts of cyber security – the Dark Web
Cybercrime profiling
Computer protection and countermeasures
Systems at risk
Cyberwarfare issues
Legal issues
Advanced Network security
The Dark Web and its impact on security
ADDITIONAL ASSESSMENT DETAILS
A single 6000 word report, based upon a case study. The report will, in part, contain some form of risk prevention/mitigation plan, based upon the analysis and evaluation of a given case study. This will be used to assess learning outcomes 1 to 5.

As part of a formative review of the assessment, there is a requirement for students to submit a plan of their report in week 8 of semester 1. It is not expected to be more than 500 words in length.
REFERRING TO TEXTS
Bartlett, J., The Dark Net, 2014, Windmill Books. ISBN: 978-0-099-59202-0.

Centre for International Governance Innovation, The Impact of the Dark Web on Internet Governance and Cyber Security (2015).
Available at: https://issuu.com/cigi/docs/gcig_paper_no6/7?e=0 .

Gollman, D. (2011). Computer Security, 3rd edition. Wiley. ISBN: 978-0470741153.

Goodrich, M.T.& Tamassia, R. (2013). Introduction to Computer Security. Pearson. ISBN: 978-1292025407.

HM Government. (2011) The UK Cyber Security Strategy Protecting and promoting the UK in a digital world. Available at: https://www.gov.uk/government/uploads/system/uploads-/attachment_data/file/60961/uk-cyber-security-strategy-final.pdf.

Johnson, T.A., Cybersecurity: Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare, 2015, ISBN-13: 978-1-48223923-2.

Kostopoulos, G.K., Cyberspace and Cybersecurity, 2013, ISBN-13: 978-1-4665-1758-5
Singer, P.W., Friedman, A., Cybersecurity and Cyberwarfare, 2014, Oxford University press=. ISBN: 978-0-19-991811-9.


ACCESSING RESOURCES
Cyber-security Information Sharing Partnership (C.I.S.P.) https://www.cert.gov.uk/cisp

Isolated Forensic/Security Lab

Case Studies
LEARNING OUTCOMES
1. Demonstrate a systematic understanding of, and critically evaluate enhanced and international aspects of cyber security.
(KNOWLEDGE & UNDERSTANDING, LEARNING, REFLECTION)

2. Critically evaluate the impact of the ‘Dark Web’ on system security, showing critical understanding of the limits, ambiguities and uncertainties of relevant information sources.
(ENQUIRY, LEARNING, ANALYSIS)

3. Critically analyse the global impact of cybersecurity – Cyberwarfare and Cyberterrorism using research at the forefront of the field.
(ENQUIRY, LEARNING, ANALYSIS)

4. Demonstrate a systematic understanding of and critically evaluate professional, legal and ethical issues relevant to computer security professionals and communicate these issues and implications.
(LEARNING, REFLECTION, COMMUNICATION)

5. Demonstrate a critical understanding of the legal aspects of cybersecurity, cybercrime and cyberwarfare.
(COMMUNICATION, KNOWLEDGE & UNDERSTANDING, REFLECTION)
Module Learning Strategies
26 hours of lectures and 26 hours of tutorials

Practical tasks and workshops will be used to re-enforce and apply theory to encourage an analytical and problem based approach. Student developed seminars will be used to enhance understanding where appropriate. These seminars will be based in part around student access to the Cyber-security Information Sharing Partnership (C.I.S.P.) https://www.cert.gov.uk/cisp