Module Descriptors
PERSPECTIVES IN INFORMATION TECHNOLOGY SECURITY
COIS70755
Key Facts
Faculty of Computing, Engineering and Sciences
Level 7
15 credits
Contact
Leader: Jonathan Westlake
Hours of Study
Scheduled Learning and Teaching Activities: 48
Independent Study Hours: 102
Total Learning Hours: 150
Assessment
  • ASSIGNMENT weighted at 50%
  • EXAMINATION - UNSEEN IN EXAMINATION CONDITIONS weighted at 50%
Module Details
Module Indicative Content
Key technologies and their relationship to maintaining secure systems
Secure architectures and topologies.
Encryption and authentication techniques.
Audit and risk analysis techniques.
Human and organisational contexts to security.
Regulatory frameworks including social and ethical issues.
Business continuity planning.
Biometric security technology.
Security policy management and practice.
Delivery of this module will be by a series of lectures, related seminars and flexible learning materials, both physical and electronic.
This will typically comprise two hours of lectures and two hours of tutorial/seminars.
Module Additional Assessment Details

Coursework - 50% (assessing Learning outcomes 1)
Exam 2 hours - 50% (assessing Learning outcomes 1, 2 and 3)
Module Learning Strategies
Lectures, practical exercises, tutorials, software demonstrations and videos will be used as appropriate to the material of the course.
(1:n)2 (1:20)2
Module Texts
Solomon and Chapple, Information Security Illuminated, Jones and Bartlett, 2005, ISBN:0-7637-2677-X

Pfleeger, C.P., S. L. Pfleeger, Security in Computing, Prentice Hall, 3rd edition, 2002, ISBN: 01303554488

International Information Systems Security (ISC)2, http://www.isc2.org (CISSP Certification).
Module Resources
Access to the library, journals and web-based resources.
Appropriate security software development kits/environments.
Access to network laboratories.
Module Special Admissions Requirements
None.