Module Descriptors
INTRODUCTION TO SECURITY TECHNOLOGIES
COMP40018
Key Facts
Digital, Technology, Innovation and Business
Level 4
20 credits
Contact
Leader: Alistair Mcloughlin-Goldstraw
Hours of Study
Scheduled Learning and Teaching Activities: 39
Independent Study Hours: 161
Total Learning Hours: 200
Pattern of Delivery
  • Occurrence B, Stoke Campus, UG Semester 2
Sites
  • Stoke Campus
Assessment
  • Group assignment based on a case study: You will be required to produce a review of four main elements - 4000 words weighted at 100%
Module Details
INDICATIVE CONTENT
Cyber Security:
Fundamental concepts of Network Management
Infrastructure security
ACL and user authentication
User authentication and encryption
Organisational security
Risk – Analysis and Management

Cyber Investigation:
Foundations of digital forensic investigation
Key technical concepts
Evidence seizure and protection
Introduction to Investigative Tools (Autopsy/Encase/XRY)
ASSESSMENT DETAILS
Group Assignment Case Study 4,000 words (100% ) Learning Outcomes 1,2,3,4.
You will be required to produce a review of four of the main elements of Cyber Security for a business. These elements are:
Risk Management
Secure Communications
Identity & Access management
Security Assessment

100% Coursework
LEARNING STRATEGIES
13 hours of lectures and 26 hours of tutorial/practical sessions. The focus will be problem lead learning using practical tasks and case study scenarios supported by theoretical underpinning delivered in a lecture. You will also be required to undertake background / directed reading to support the material delivered during lectures and to support / enhance the work undertaken during the practical sessions. As this is an introduction module, there will be an emphasis on providing students with the basic, underlying knowledge and skills required to understand the general area of Cyber security and digital investigation. Students will be introduced to the facts by lectures. Tutorial sessions that will be used to both embed the facts from lectures, and to begin to develop the skills required.

On occasion, discussion groups may be held to promote query and develop skills in evaluating data and evidence.
LEARNING OUTCOMES
1. Demonstrate knowledge and understanding of methods and procedures used within cyber security to include ethical and legal implications and issues.

Knowledge and Understanding, Learning, Reflection.

2. Demonstrate an understanding of the tools and techniques used within cyber security.

Knowledge and Understanding, Problem Solving.

3. Demonstrate an understanding of how a digital investigation into a cyber event will be undertaken and managed.

Knowledge and Understanding, Problem Solving, Communication.

4. Identify cyber security risks and propose relevant and workable solutions.

Enquiry, Analysis, Problem Solving, Application.
RESOURCES
Specialised software and hardware as provided in Cyber Security lab.

Lecture notes and tutorial notes provided via blackboard

Supplementary handouts/resources as and when appropriate provided by lecturer(s)
TEXTS
Conklin, W. (2016). Principles of computer security. New York: McGraw-Hill Education. ISBN:0071835970

Data Protection Act 2018 and GDPR 2018 ISO/IEC/IEEE 29148:2011

Kostopoulos, G.K. (2017). Cyberspace and Cybersecurity, 2nd edn. Auerbach Publications. ISBN: 9781351653077