INDICATIVE CONTENT
Cyber Security:
Fundamental concepts of Network Management
Infrastructure security
ACL and user authentication
User authentication and encryption
Organisational security
Risk – Analysis and Management
Cyber Investigation:
Foundations of digital forensic investigation
Key technical concepts
Evidence seizure and protection
Introduction to Investigative Tools (Autopsy/Encase/XRY)
ASSESSMENT DETAILS
Group Assignment Case Study 4,000 words (100% ) Learning Outcomes 1,2,3,4.
You will be required to produce a review of four of the main elements of Cyber Security for a business. These elements are:
Risk Management
Secure Communications
Identity & Access management
Security Assessment
100% Coursework
LEARNING STRATEGIES
13 hours of lectures and 26 hours of tutorial/practical sessions. The focus will be problem lead learning using practical tasks and case study scenarios supported by theoretical underpinning delivered in a lecture. You will also be required to undertake background / directed reading to support the material delivered during lectures and to support / enhance the work undertaken during the practical sessions. As this is an introduction module, there will be an emphasis on providing students with the basic, underlying knowledge and skills required to understand the general area of Cyber security and digital investigation. Students will be introduced to the facts by lectures. Tutorial sessions that will be used to both embed the facts from lectures, and to begin to develop the skills required.
On occasion, discussion groups may be held to promote query and develop skills in evaluating data and evidence.
LEARNING OUTCOMES
1. Demonstrate knowledge and understanding of methods and procedures used within cyber security to include ethical and legal implications and issues.
Knowledge and Understanding, Learning, Reflection.
2. Demonstrate an understanding of the tools and techniques used within cyber security.
Knowledge and Understanding, Problem Solving.
3. Demonstrate an understanding of how a digital investigation into a cyber event will be undertaken and managed.
Knowledge and Understanding, Problem Solving, Communication.
4. Identify cyber security risks and propose relevant and workable solutions.
Enquiry, Analysis, Problem Solving, Application.
RESOURCES
Specialised software and hardware as provided in Cyber Security lab.
Lecture notes and tutorial notes provided via blackboard
Supplementary handouts/resources as and when appropriate provided by lecturer(s)
TEXTS
Conklin, W. (2016). Principles of computer security. New York: McGraw-Hill Education. ISBN:0071835970
Data Protection Act 2018 and GDPR 2018 ISO/IEC/IEEE 29148:2011
Kostopoulos, G.K. (2017). Cyberspace and Cybersecurity, 2nd edn. Auerbach Publications. ISBN: 9781351653077