Module Learning Strategies
Lectures, practical exercises, tutorials, software demonstrations and videos will be used as appropriate to the material of the course.
(1:n)2 (1:20)2
Module Additional Assessment Details
Coursework - 50% (assessing Learning outcomes 1)
Exam 2 hours - 50% (assessing Learning outcomes 1, 2 and 3)
Module Texts
Solomon and Chapple, Information Security Illuminated, Jones and Bartlett, 2005, ISBN:0-7637-2677-X
Pfleeger, C.P., S. L. Pfleeger, Security in Computing, Prentice Hall, 3rd edition, 2002, ISBN: 01303554488
International Information Systems Security (ISC)2, http://www.isc2.org (CISSP Certification).
Module Indicative Content
Key technologies and their relationship to maintaining secure systems
Secure architectures and topologies.
Encryption and authentication techniques.
Audit and risk analysis techniques.
Human and organisational contexts to security.
Regulatory frameworks including social and ethical issues.
Business continuity planning.
Biometric security technology.
Security policy management and practice.
Delivery of this module will be by a series of lectures, related seminars and flexible learning materials, both physical and electronic.
This will typically comprise two hours of lectures and two hours of tutorial/seminars.
Module Special Admissions Requirements
None.
Module Resources
Access to the library, journals and web-based resources.
Appropriate security software development kits/environments.
Access to network laboratories.