Module Additional Assessment Details
An ASSIGNMENT weighted at 100%.
A single written report of 3000 words. Students will be presented topics and required to produce a detailed and well referenced report in relation to these. (Learning Outcomes 1 to 4).
Module Indicative Content
This module will address topics of:
Information Security Models
Information Security Governance
Social engineering
Threat & Risk Assessment
Cyber Domain & Cyber Operations
Operate and Collect/Cyber Intelligence
Network Traffic analyses
Machine Learning within the Cyber domain
Module Learning Strategies
As a distance learning module, there will not be a traditional lecture every week. The main learning environment that will be used is our Virtual Learning Environment (VLE). Students will work through the module material provided on the VLE at a pace suggested by the instructors. The Instructors will monitor student progress, providing their expertise where necessary for assisting in solving problems. Students will be encouraged to discuss relevant aspects within discussion forums that are part of the VLE. The forums will allow discussion with a student's peer group as well as the module tutor.
Module Resources
Access to software emulators and open source software.
Module Special Admissions Requirements
None
Module Special Admissions Requirements
None
Module Learning Outcomes
1. Show systematic understanding and knowledge of managing an information infrastructure in terms of deterrence, detection, protection and reaction to access.
Enquiry
Knowledge & Understanding
2. Show originality in the application of the different types of cyber operations and their utilization and deployment based on the scenario at hand.
Application
3. Critically reflect on implementation and management issues and topics of Cyber Operations at all levels Problem Solving
Reflection
4. Demonstrate self-direction and creativity in conducting risk and threat assessments
Application
Analysis
Module Texts
Chapple. M, and Seidl. D, (2015) Cyberwarfare: information operations in a connected world, Jones & Barlett Learning, ISBN: 978-1-284-05848-2.
Czosseck. C, and Geers, K. (2009), Virtual Battlefield: perspectives on cyber warfare, IOS Press, ISBN 9781607500605.
Porche, I. et.al. (2013) Redefining information warfare boundaries for an army in a wireless world, RAND Corporation, ISBN 9780833059123.
Kilger, M. et.al. (2012) Reverse Deception: organised cyber threat counter-exploitation, McGraw-Hill Education, ISBN 0071772499.
Web Descriptor
In studying this module you will learn to conduct risk and threat assessments and plan a cyber-operation at strategic, tactical and operational levels. At the end of it you should have become expert in evaluating risks and threats to the level you can suggest suitable strategy to lower the potential of an attack to a computer system.