Module Descriptors
PERSPECTIVES IN INFORMATION TECHNOLOGY SECURITY (D/L)
COIS70698
Key Facts
Digital, Technology, Innovation and Business
Level 7
15 credits
Contact
Leader: Christopher Howard
Hours of Study
Scheduled Learning and Teaching Activities: 3
Independent Study Hours: 147
Total Learning Hours: 150
Assessment
  • PORTFOLIO weighted at 30%
  • ASSIGNMENT weighted at 70%
Module Details
Module Indicative Content
Key technologies and their relationship to maintaining secure systems
Secure architectures and topologies.
Encryption and authentication techniques.
Audit and risk analysis techniques.
Human and organisational contexts to security.
Regulatory frameworks including social and ethical issues.
Business continuity planning.
Biometric security technology.
Security policy management and practice.
Module Additional Assessment Details
100% in course assessment.

Assignment weighted at 70%. (Learning outcomes 1). In course assessment, 3000 words written policy document for a security scenario.

A portfolio weighted at 30% (learning outcomes 2 and 3). A variety of tasks will be undertaken which can be built up into an on-line portfolio. Short tests administered through Blackboard will be used where appropriate.
Module Learning Strategies
On-line materials will exemplify topical issues and best practice case studies.
The practical nature of the module is emphasised by the provision of practical portfolio tasks and an assignment which reflects all the elements of the module.
Appropriate software applications for supporting IT security will be used.
On-line, telephone and email support will be provided as necessary.
Within this module you will be introduced to and/or be able to develop your:
- Intellectual skills
- Problem solving
- Personal skills for Lifelong Learning
Module Texts
Solomon and Chapple, Information Security Illuminated, Jones and Bartlett, 2005, ISBN:0-7637-2677-X
Pfleeger, C.P., S. L. Pfleeger, Security in Computing, Prentice Hall, 3rd edition, 2002, ISBN: 01303554488
International Information Systems Security (ISC)2, http://www.isc2.org (CISSP Certification).

For other texts refer to module website.
Module Resources
Access to the online library, journals and web-based resources.
Module website via Blackboard VLE
Access to Internet
Appropriate security software development kits/environments e.g. Glassfish Java EE SDK
Module Special Admissions Requirements
None.