Indicative Content
The module has been designed to provide students with the necessary information about the fundamentals of cyber security and help them develop a comprehensive approach to security practices. The module introduces students to a variety of security topics:
Fundamental concepts of security engineering.
The significance of security protocols and frameworks (including ISOs/NIST, Cyber Essentials) and consideration of legal, ethical and standardisation requirements in information systems security.
Information security governance and risk management
Asset Security
Identity and Access Management (IAM) (Access-control and access-security), authentication in distributed systems and cloud security
Basics of operating systems security
Systems-administration, attack scenarios, failure mechanisms and defensive solutions
Cryptography and crypto systems
Physical or environmental security
Software and web-application development security best practices
Communication and network security
Business continuity and disaster recovery
Malware and Advanced Persistent Threats
Digital Forensics (Tools, Technologies, Biometrics and cyber crimes)
The Dark Web and its impact on security
Impact of Artificial Intelligence (AI) on advanced cyber security technologies and threat hunting platforms (SIEMs, SOCs, and intrusion detection practices)
Presentation – This is a group based assignment. The assignment is based on a given case study which in part, will contain some form of risk prevention/mitigation planning, based upon the analysis and evaluation of a detailed scenario comprising 4 tasks. Students will need to identify and take roles and complete research prior to the presentation (Learning Outcomes 1, 2 and 3).
Written Report – The written report is an individual assessment, based upon individual research. Students need to report on an aspect of cybersecurity based around data/system security and recovery from a cyber-attack. A selection of topics will be provided from which one needs to be chosen to implement a cyber based solution (Learning Outcomes 1 to 4).
Learning Strategies
Practical tasks and workshops will be used to re-enforce and apply theory to encourage an analytical and problem based approach. Student developed seminars will be used to enhance understanding where appropriate. These seminars will be based in part around student access to the Cyber-security Information Sharing Partnership (C.I.S.P.) https://www.cert.gov.uk/cisp
Learning Outcomes
1. Demonstrate a critical understanding and be able to evaluate fundamentals of cyber security.
Enquiry,
Learning,
Analysis,
Reflection
2. Critically analyse and formally implement the process of identifying threats and risks to data, systems and networks.
Enquiry,
Knowledge and Understanding,
Learning,
Communication
3. Demonstrate a critical understanding of the cyber security process and planning to secure data, systems and networks using research at the forefront of the field.
Communication,
Knowledge and Understanding,
Problem solving,
Application
4. Analyse, apply and evaluate cyber security technologies (e.g. threat visualisation, riskware detection, endpoint protection, etc.) to protect data, systems and networks.
Analysis,
Application,
problem solving
Resources
Cyber-security Information Sharing Partnership (C.I.S.P.) https://www.cert.gov.uk/cisp
Isolated Forensic/cyber security Lab (Access to Cyber Lab and Virtual Machines)
Case Studies
Access to ISO(27001, 27002, and 27005)
Texts
All texts and electronic resources will be updated and refreshed on an annual basis and available for students via the online Study Links resource platform. All reference materials will be collated and curated and aligned to Equality, Diversity & Inclusion indicators.
Data Protection Act 2018 and GDPR 2018 ISO/IEC/IEEE 29148:2011
Chapple, M et al. (2021). (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide. (ISC)2. Sybex; 9th Edition
Conklin A.W., et al., (2021). Principles of Computer Security. CompTIA Security+ and Beyond, Sixth Edition (Exam SY0-601)
Conklin, W. (2016). Principles of computer security. New York: McGraw-Hill Education
Easttom, C. (2016). Computer security fundamentals. 3rd edn. Indianapolis, IN: Pearson Education
HM Government, National Cyber Security Strategy 2016 to 2021, Published on Nov. 2016, https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/567242/-national_cyber_security_strategy_2016.pdf
Chio, C. and Freeman, D., (2018). Machine learning and security: Protecting systems with data and algorithms. O'Reilly Media, Inc.
Parisi, A., (2019). Hands-on artificial intelligence for cybersecurity: Implement smart AI systems for preventing cyber attacks and detecting threats and network anomalies. Packt Publishing Ltd
Misra, S. ed., (2021). Artificial Intelligence for Cyber Security: Methods, Issues and Possible Horizons Or Opportunities (Vol. 972). Springer Nature.
Patel, A. et. al. (2022), Infrastructure Automation with Terraform: Automate and Orchestrate your Infrastructure with Terraform Across AWS and Microsoft Azure (English Edition), BPB Publications
Pinto, I, (2021), Network Automation Made Easy (Networking Technology), Cisco Press; 1st edition
Okasha, L. (2020), Network Automation Cookbook: Proven and actionable recipes to automate and manage network devices using Ansible, Packt Publishing; Illustrated edition
Web Descriptor
This module has been designed to provide students with the necessary information about the fundamentals of cyber security and help them develop a comprehensive approach to security practices. The module introduces students to a variety of security topics including fundamental concepts of security engineering, the significance of security protocols and frameworks and consideration of legal, ethical and standardisation requirements in information systems security. Students will learn and apply extensive theoretical and advanced technological skills in cyber security for solving real-world problems.