Module Descriptors
CYBER SECURITY
COMP50062
Key Facts
Digital, Technology, Innovation and Business
Level 5
20 credits
Contact
Leader: Maryam Shahpasand
Hours of Study
Scheduled Learning and Teaching Activities: 52
Independent Study Hours: 148
Total Learning Hours: 200
Pattern of Delivery
  • Occurrence A, Stoke Campus, UG Semester 1
  • Occurrence B, Digital Institute London, UG Semester 1
  • Occurrence C, British University Vietnam, UG Semester 1
  • Occurrence D, British University Vietnam, UG Semester 2
  • Occurrence G, British University Vietnam, UG Semester 3
Sites
  • British University Vietnam
  • Digital Institute London
  • Stoke Campus
Assessment
  • PRESENTATION - 15 mins PRESENTATION - 15 mins weighted at 50%
  • WRITTEN REPORT - 3000 words weighted at 50%
Module Details
Indicative Content
The module has been designed to provide students with the necessary information about the fundamentals of cyber security and help them develop a comprehensive approach to security practices. The module introduces students to a variety of security topics:

Fundamental concepts of security engineering.

The significance of security protocols and frameworks (including ISOs/NIST, Cyber Essentials) and consideration of legal, ethical and standardisation requirements in information systems security.

Information security governance and risk management

Asset Security

Identity and Access Management (IAM) (Access-control and access-security), authentication in distributed systems and cloud security

Basics of operating systems security

Systems-administration, attack scenarios, failure mechanisms and defensive solutions

Cryptography and crypto systems

Physical or environmental security

Software and web-application development security best practices

Communication and network security

Business continuity and disaster recovery

Malware and Advanced Persistent Threats

Digital Forensics (Tools, Technologies, Biometrics and cyber crimes)

The Dark Web and its impact on security

Impact of Artificial Intelligence (AI) on advanced cyber security technologies and threat hunting platforms (SIEMs, SOCs, and intrusion detection practices)

Presentation – This is a group based assignment. The assignment is based on a given case study which in part, will contain some form of risk prevention/mitigation planning, based upon the analysis and evaluation of a detailed scenario comprising 4 tasks. Students will need to identify and take roles and complete research prior to the presentation (Learning Outcomes 1, 2 and 3).

Written Report – The written report is an individual assessment, based upon individual research. Students need to report on an aspect of cybersecurity based around data/system security and recovery from a cyber-attack. A selection of topics will be provided from which one needs to be chosen to implement a cyber based solution (Learning Outcomes 1 to 4).
Learning Strategies
Practical tasks and workshops will be used to re-enforce and apply theory to encourage an analytical and problem based approach. Student developed seminars will be used to enhance understanding where appropriate. These seminars will be based in part around student access to the Cyber-security Information Sharing Partnership (C.I.S.P.) https://www.cert.gov.uk/cisp
Learning Outcomes


1. Demonstrate a critical understanding and be able to evaluate fundamentals of cyber security.

Enquiry,

Learning,
Analysis,

Reflection

2. Critically analyse and formally implement the process of identifying threats and risks to data, systems and networks.

Enquiry,

Knowledge and Understanding,

Learning,
Communication

3. Demonstrate a critical understanding of the cyber security process and planning to secure data, systems and networks using research at the forefront of the field.

Communication,

Knowledge and Understanding,

Problem solving,

Application

4. Analyse, apply and evaluate cyber security technologies (e.g. threat visualisation, riskware detection, endpoint protection, etc.) to protect data, systems and networks.

Analysis,

Application,

problem solving

Resources
Cyber-security Information Sharing Partnership (C.I.S.P.) https://www.cert.gov.uk/cisp

Isolated Forensic/cyber security Lab (Access to Cyber Lab and Virtual Machines)

Case Studies

Access to ISO(27001, 27002, and 27005)

Texts
All texts and electronic resources will be updated and refreshed on an annual basis and available for students via the online Study Links resource platform. All reference materials will be collated and curated and aligned to Equality, Diversity & Inclusion indicators.



Data Protection Act 2018 and GDPR 2018 ISO/IEC/IEEE 29148:2011

Chapple, M et al. (2021). (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide. (ISC)2. Sybex; 9th Edition

Conklin A.W., et al., (2021). Principles of Computer Security. CompTIA Security+ and Beyond, Sixth Edition (Exam SY0-601)

Conklin, W. (2016). Principles of computer security. New York: McGraw-Hill Education

Easttom, C. (2016). Computer security fundamentals. 3rd edn. Indianapolis, IN: Pearson Education

HM Government, National Cyber Security Strategy 2016 to 2021, Published on Nov. 2016, https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/567242/-national_cyber_security_strategy_2016.pdf

Chio, C. and Freeman, D., (2018). Machine learning and security: Protecting systems with data and algorithms. O'Reilly Media, Inc.

Parisi, A., (2019). Hands-on artificial intelligence for cybersecurity: Implement smart AI systems for preventing cyber attacks and detecting threats and network anomalies. Packt Publishing Ltd

Misra, S. ed., (2021). Artificial Intelligence for Cyber Security: Methods, Issues and Possible Horizons Or Opportunities (Vol. 972). Springer Nature.

Patel, A. et. al. (2022), Infrastructure Automation with Terraform: Automate and Orchestrate your Infrastructure with Terraform Across AWS and Microsoft Azure (English Edition), BPB Publications

Pinto, I, (2021), Network Automation Made Easy (Networking Technology), Cisco Press; 1st edition

Okasha, L. (2020), Network Automation Cookbook: Proven and actionable recipes to automate and manage network devices using Ansible, Packt Publishing; Illustrated edition

Web Descriptor
This module has been designed to provide students with the necessary information about the fundamentals of cyber security and help them develop a comprehensive approach to security practices. The module introduces students to a variety of security topics including fundamental concepts of security engineering, the significance of security protocols and frameworks and consideration of legal, ethical and standardisation requirements in information systems security. Students will learn and apply extensive theoretical and advanced technological skills in cyber security for solving real-world problems.