Module Descriptors
COMPUTER SECURITY: HIGH LEVEL (D/L)
COCS71165
Key Facts
School of Digital, Technologies and Arts
Level 7
15 credits
Contact
Leader:
Email:
Hours of Study
Scheduled Learning and Teaching Activities: 3
Independent Study Hours: 147
Total Learning Hours: 150
Assessment
  • ASSIGNMENT (3000 WORDS APPROX) weighted at 100%
Module Details
ADDITIONAL ASSESSMENT DETAILS
Assignment (3000 words excluding appendices) will typically require a critical review of tools, techniques used and performance of an analysis or investigation of a given high level security component.
Assessing Learning Outcomes 1-3.
INDICATIVE CONTENT
Security Standards (ISO 27002), Penetration Testing, Vulnerability Assessment, Operating System
Hardening, Incident Response, Security Models, Security Policy and Risk Analysis.
Human Factors in security. Legal and ethical issues.

LEARNING STRATEGIES
The material will be presented through a combination of directed self-study, recorded lectures, on-line materials in Blackboard, practical exercises that can be conducted using the server infrastructure and VPN to provide access to platforms for practical exercises, asynchronous handling of queries via email and discussion board, but also synchronous surgery sessions (with access to on-line virtual infrastructure) and skype as necessary.
RESOURCES
Access to forensic computing laboratory that can be isolated from the University network
Access to network laboratories
VMware
TEXTS
ISO 27002, Code of practice for information security, ISO/IEC

Murdoch, D., Blue Team Handbook: Incident Response Edition: A condensed field guide for the Cyber Security Incident Responder, CreateSpace Independent Publishing, 2nd edition, 2014, ISBN: 1500734756

Pfleeger, C.P., S. L. Pfleeger, Security in Computing, Prentice Hall, 5th Edition, 2015, ISBN: 0134085043

Spasojevic, B., Gray Hat Hacking: The Ethical Hacker's Handbook, 4th Edition, McGrawHill, 2015, ISBN: 0071832386

Stallings, W., L Brown, Computer Security: Principles and Practices, 3rd edition, 2014, ISBN: 1292066172

Wilhelm, T., Professional Penetration Testing, Syngress, 2nd edition, 2013, ISBN: 1597499935

Other journal articles, trade publications and internet sources as appropriate.
LEARNING OUTCOMES
1. Demonstrate systematic understanding of the principles and concepts involved in security at the level of policy/strategy and the whole computer system and the social, legal and ethical issues involved. (Knowledge and Understanding).
2. Analyse or investigate a high level security component or system using appropriate tools and techniques and critically discuss issues involved. (Analysis, Enquiry).
3. Critically evaluate various tools, techniques and approaches used in the analysis and definition of high level security components. (Analysis, Enquiry)