ADDITIONAL ASSESSMENT DETAILS
Assignment (3000 words excluding appendices) will typically require a critical review of tools, techniques used and performance of an analysis or investigation of a given high level security component.
Assessing Learning Outcomes 1-3.
INDICATIVE CONTENT
Security Standards (ISO 27002), Penetration Testing, Vulnerability Assessment, Operating System
Hardening, Incident Response, Security Models, Security Policy and Risk Analysis.
Human Factors in security. Legal and ethical issues.
LEARNING STRATEGIES
The material will be presented through a combination of directed self-study, recorded lectures, on-line materials in Blackboard, practical exercises that can be conducted using the server infrastructure and VPN to provide access to platforms for practical exercises, asynchronous handling of queries via email and discussion board, but also synchronous surgery sessions (with access to on-line virtual infrastructure) and skype as necessary.
RESOURCES
Access to forensic computing laboratory that can be isolated from the University network
Access to network laboratories
VMware
TEXTS
ISO 27002, Code of practice for information security, ISO/IEC
Murdoch, D., Blue Team Handbook: Incident Response Edition: A condensed field guide for the Cyber Security Incident Responder, CreateSpace Independent Publishing, 2nd edition, 2014, ISBN: 1500734756
Pfleeger, C.P., S. L. Pfleeger, Security in Computing, Prentice Hall, 5th Edition, 2015, ISBN: 0134085043
Spasojevic, B., Gray Hat Hacking: The Ethical Hacker's Handbook, 4th Edition, McGrawHill, 2015, ISBN: 0071832386
Stallings, W., L Brown, Computer Security: Principles and Practices, 3rd edition, 2014, ISBN: 1292066172
Wilhelm, T., Professional Penetration Testing, Syngress, 2nd edition, 2013, ISBN: 1597499935
Other journal articles, trade publications and internet sources as appropriate.
LEARNING OUTCOMES
1. Demonstrate systematic understanding of the principles and concepts involved in security at the level of policy/strategy and the whole computer system and the social, legal and ethical issues involved. (Knowledge and Understanding).
2. Analyse or investigate a high level security component or system using appropriate tools and techniques and critically discuss issues involved. (Analysis, Enquiry).
3. Critically evaluate various tools, techniques and approaches used in the analysis and definition of high level security components. (Analysis, Enquiry)