Module Learning Strategies
Lectures 2 hours per week, tutorial/practical 2 hours per week, directed reading and research.
The tutorial/practical session will have to be scheduled in an appropriate laboratory.
(1:n)2 (1:20)2
Module Additional Assessment Details
Assignment (3000 words excluding appendices) will typically require a critical review of tools, techniques used and performance of an analysis or investigation of a given high level security component.
Assessing Learning Outcomes 1-3.
Module Indicative Content
Security Standards (ISO 27002), Penetration Testing, Vulnerability Assessment, Operating System Hardening, Incident Response, Security Models, Security Policy and Risk Analysis.
Human Factors in security. Legal and ethical issues.
Module Texts
ISO 27002, Code of practice for information security, ISO/IEC
Andrew Whitaker, Daniel P. Newman, Penetration Testing and Network Defense, Cisco Press, 2005, ISBN: 1-58705-208-3
Harris, S., Harper, A., Eagle, C., Ness, J., Gray Hat Hacking: The Ethical Hacker's Handbook, 2nd Edition, McGraw-Hill, 2008, ISBN: 0071495681
Handbook for Computer Security Incident Response Teams (CSIRTs), 2003, Carnegie Mellon University
Steve Manzuik, Network security assessment: from vulnerability to patch, 2007, Syngress William Stallings, Lawrie Brown, Computer Security: Principles and Practices, 2008, ISBN: 9780136004240
Pfleeger, C.P., S. L. Pfleeger, Security in Computing, Prentice Hall, 4th Edition, 2006, ISBN: 978-0132390774
Other journal articles, trade publications and internet sources as appropriate.