Module Texts
SO 27002, Code of practice for information security, ISO/IEC
Andrew Whitaker, Daniel P. Newman, Penetration Testing and Network Defense, Cisco Press, 2005, ISBN: 1-58705-208-3
Harris, S., Harper, A., Eagle, C., Ness, J., Gray Hat Hacking: The Ethical Hacker's Handbook, 2nd Edition, McGraw-Hill, 2008, ISBN: 0071495681
Handbook for Computer Security Incident Response Teams (CSIRTs), 2003, Carnegie Mellon University
Steve Manzuik, Network security assessment: from vulnerability to patch, 2007, Syngress William Stallings, Lawrie Brown, Computer Security: Principles and Practices, 2008, ISBN: 9780136004240
Pfleeger, C.P., S. L. Pfleeger, Security in Computing, Prentice Hall, 4th Edition, 2006, ISBN: 978-0132390774
Other journal articles, trade publications and internet sources as appropriate.
Module Indicative Content
Security Standards (ISO 27002), Penetration Testing, Vulnerability Assessment, Operating System Hardening, Incident Response, Security Models, Security Policy and Risk Analysis.
Human Factors in security. Legal and ethical issues. Management of networks to avoid malware intrusions.
Module Learning Strategies
Lectures 2 hours per week, tutorial/practical 2 hours per week, directed reading and research.
The tutorial/practical session will have to be scheduled in an appropriate laboratory.
(1:n)2 (1:20)2
Module Additional Assessment Details
Coursework - 50% (Learning outcomes 1 and 2)
The coursework will be based on a case study that will require you to design and implement a mobile application to satisfy specified functional objectives, word limit 3000 words.
Examination - 50% (Learning outcomes 3 and 4)