Module Additional Assessment Details
An ASSIGNMENT weighted at 100%.
A single written report of 3000 words. Students will be presented topics and required to produce a detailed and well referenced report in relation to these. (Learning Outcomes 1 to 4).
Module Indicative Content
This module will address topics of:
Information Security Models
Information Security Governance
Social engineering
Threat & Risk Assessment
Cyber Domain & Cyber Operations
Operate and Collect/Cyber Intelligence
Network Traffic analyses
Machine Learning within the Cyber domain
Module Learning Strategies
Teaching material will be presented through a combination of lectures, tutorials, practical exercises and directed self-study. Practical exercises will be based around case studies.
Teaching delivery will consist of 12 hours of lectures and 24 hours practical/tutorial sessions.
Module Resources
Access to a digital forensics lab.
Module Special Admissions Requirements
None.
Module Texts
Chapple. M, and Seidl. D, (2015) Cyberwarfare: information operations in a connected world, Jones & Barlett Learning, ISBN: 978-1-284-05848-2.
Czosseck. C, and Geers, K. (2009), Virtual Battlefield: perspectives on cyber warfare, IOS Press, ISBN 9781607500605.
Porche, I. et.al. (2013) Redefining information warfare boundaries for an army in a wireless world, RAND Corporation, ISBN 9780833059123.
Kilger, M. et.al. (2012) Reverse Deception: organised cyber threat counter-exploitation, McGraw-Hill Education, ISBN 0071772499.
Module Learning Outcomes
1. Show systematic understanding and knowledge of managing an information infrastructure in terms of deterrence, detection, protection and reaction to access.
Enquiry
Knowledge & Understanding
2. Show originality in the application of the different types of cyber operations and their utilization and deployment based on the scenario at hand.
Application
3. Critically reflect on implementation and management issues and topics of Cyber Operations at all levels Problem Solving
Reflection
4. Demonstrate self-direction and creativity in conducting risk and threat assessments
Application
Analysis
Module Learning Strategies
Teaching material will be presented through a combination of lectures, tutorials, practical exercises and directed self-study. Practical exercises will be based around case studies.
Teaching delivery will consist of 13 hours of lectures and 26 hours practical/tutorial sessions.
Web Descriptor
In studying this module you will learn to conduct risk and threat assessments and plan a cyber-operation at strategic, tactical and operational levels. At the end of it you should have become expert in evaluating risks and threats to the level you can suggest suitable strategy to lower the potential of an attack to a computer system.