Module Descriptors
NETWORK AND INFRASTRUCTURE SECURITY
COMP60073
Key Facts
Digital, Technology, Innovation and Business
Level 6
20 credits
Contact
Leader: Mostafa Tajdini
Hours of Study
Scheduled Learning and Teaching Activities: 39
Independent Study Hours: 161
Total Learning Hours: 200
Pattern of Delivery
  • Occurrence A, Stoke Campus, UG Semester 1
  • Occurrence B, Digital Institute London, UG Semester 1
  • Occurrence C, British University Vietnam, UG Semester 1
  • Occurrence G, British University Vietnam, UG Semester 3
Sites
  • British University Vietnam
  • Digital Institute London
  • Stoke Campus
Assessment
  • WRITTEN REPORT - 1500 words weighted at 50%
  • WRITTEN REPORT - 1500 words weighted at 50%
Module Details
INDICATIVE CONTENT
This module will explore the following topics

The first part of this module will cover:

- IT infrastructure overview

- IT Building Blocks

- Threat Model

- Common service security

- Web server security

- DNS Security

- Enterprise mail server security

- VPN

- SSH

- NFS/CIFS security

- Clustering & Storage

- Centralised Authentication

- LDAP

- Active Directory

- Enterprise systems performance tuning - Intrusion Detection

- Legal, ethical and social implications of malware

The second part of this module examines operational viruses and malicious code that are designed to attack and compromise computer systems, and the methods used to exploit a weakness in installed software that could lead to the system being fully controlled.
ADDITIONAL ASSESSMENT DETAILS
Written Report – A written report documenting a portfolio of artefacts will be completed individually and will get students to investigate and explore setting up security aspects for both standalone and network related systems. Part of this work will involve appraisal of infrastructure and the contained components (Learning Outcomes 1 to 2).

Written Report – A written report which will typically require a critical review/analysis of specific malicious code. The student will be required to perform static and dynamic analysis of the given malicious code. The assignment is completed as an individual task following standard methods to analyse viruses and malicious code. Full documentation of the process and its outcome are expected (Learning Outcomes 2 to 4).
LEARNING OUTCOMES
1. CRITICALLY DISCUSS THE PRINCIPLES AND CONCEPTS INVOLVED IN THE SECURING OF INFORMATION TECHNOLOGY INFRASTRUCTURE FOR BOTH STAND-ALONE SET-UPS AND NETWORKS

Knowledge and Understanding, Enquiry

2. DESIGN A SECURE INFRASTRUCTURE AND APPRAISE THE INTERRELATIONSHIPS AMONG ELEMENTS THAT COMPRISE A MODERN SECURITY SYSTEM.

Analysis, Problem Solving, Application

3. DEMONSTRATE A CRITICAL AND SYSTEMATIC UNDERSTANDING OF MALICIOUS SOFTWARE AND MALICIOUS CODE IMPLEMENTATION AND THE SOCIAL, LEGAL AND ETHICAL IMPLICATIONS OF MALWARE AND ATTENDANT COMMERCIAL RISKS FROM INFECTION.

Knowledge and Understanding

4. CRITICALLY EVALUATE THE DESIGN, CODE AND THE IMPLEMENTATION OF A MALICIOUS COMPONENT AND THE STEPS REQUIRED TO REVERSE ENGINEER THE PROCESS.

Application
LEARNING STRATEGIES
This module has a mix of learning methods, including lectures, tutorials / labs, independent reading and discussions. The lectures will explain the concept and the theoretical content that give the student a detailed understanding of the topics. The tutorial / lab sessions will allow the student to carry out practical exercises in relation to the lecture topics directly. Independent reading and discussion (during the tutorial sessions) will help to acquaint the student with the terminology in the field and current issues associated with the topic.
RESOURCES
Remote access to laboratory resources and/or with our (VPN access),
Access to purposely built VMs in the Cyber Lab
REFERENCE TEXTS
Estrin, E. (2022), Cloud Security Handbook: Find out how to effectively secure cloud environments using AWS, Azure, and GCP, Packt Publishing

Hereth, P. (2021), Azure Cloud Security for Absolute Beginners: Enabling Cloud Infrastructure Security with Multi-Level Security Options, Apress; 1st ed. Edition

Blokdyk, G. (2021), loud Security and Risk Standards: Third Edition, 5STARCooks

Binnie, C. (2016) Linux Server Security. Wiley, ISBN
Data Protection Act 2018 and GDPR 2018 ISO/IEC/IEEE 29148:2011
ISO 8000-8:2015 Data quality -- Part 8: Information and data quality: Concepts and measuring
Krause, J. (2016) Windows Server 2016 Security. Packt
Laan, S. (2017). IT Infrastructure Architecture,
Tevault, D.A. (2018). Mastering Linux Security and Hardening.
Thomas, K. (2017). Email Architecture, Design, and Implementations, 2nd edn. CreateSpace Independent Publishing.

Elisan, C. (2015) Advanced malware analysis. C., McGraw-Hill Education.
Caballero, J, Zurutuza U, Ricardo J. Rodríguez J ( 2016) Detection of Intrusions and Malware, and Vulnerability Assessment DIMVA 2016 Conference Proceedings

Song, H. (2022), Internet Of Everything: Key Technologies, Practical Applications And Security Of IoT, World Scientific Publishing Co Pte Lt

Lele, C. (2022), Internet of Things (IoT) A Quick Start Guide: A to Z of IoT Essentials (English Edition), BPB Publications

Herreo, C. (2022), Fundamentals of IoT Communication Technologies (Textbooks in Telecommunication Engineering), Springer; 1st ed. 2022 edition¿
WEB DESCRIPTOR
This module will focus on the identification and the forensic analysis of malicious code. The module will do so at a practical level and students will therefore explore computing infrastructure, security protocols, and general security issues and threats. To give the module a final topic, legal, ethical and social implications of malware are also considered.