MODULE LEARNING OUTCOMES
1. Analyse systems and vulnerability of a hypothetical or real intelligence target
2. Review threat analysis results
3. Provide risk assessment (for systems/business/customer)
4. Provide risk amelioration recommendations (for systems/business)
MODULE ADDITIONAL ASSESSMENT DETAILS
This will be a group assignment, aimed at evaluating skills and knowledge in the evaluation of a provided hypothetical or real-world customer. Counterintelligence analysis tools will be employed to identify potential threats using a variety of technical and traditional means and students will provide a detailed set of recommendations required to address these issues.
Group Presentation (as if to Exec board of company) detailing results and proposed implementations.
LOs 1,2,3&4
Individual report based on the phases of intelligence cycle that the student was assigned LO’s 1 & 2 or LOs 3&4
Individual critical reflection on own and team’s performance
LO’s 3 & 4
The assignment will be ‘streamed’ so a mix of EACH award will perform different tasks divided along the lines of the intelligence cycle. Typically group membership will be allocated on this basis:
Analysis & evaluation (Sci)
Evaluation & reporting (Stu)
Specific details relating to the assignment will be provided and will include, but not limited to,
Case study
Network diagram
Business functions diagram
Organisational chart
Briefing material
Module Learning Outcomes covered: 1, 2, 3 and 4
MODULE INDICATIVE CONTENT
The focus of this module is on the defence of organisations from the potential intelligence gathering activities of competitors. To this end both practical skills, and knowledge of IT systems and testing will be deployed alongside wider social, economic and political threat analyses. The practical element will include hypothetical thinking, historical research, open-source data collection and potentially also the use of Ethical Hacking skills to evaluate vulnerabilities within a provided virtualised system.
WEB DESCRIPTOR
The focus of this module is on the defence of organisations from the potential intelligence gathering activities of competitors. Students will demonstrate an understanding of the general discipline theory as well as practical intelligence gathering techniques that are in demand within this employment sector.
MODULE LEARNING STRATEGIES
Teaching material will be presented through a combination of lectures, tutorials, practical exercises, and directed self-study.
Teaching delivery will consist of 39 hours of lectures, seminars, workshops and other group work.
MODULE TEXTS
Mark M. Lowenthal, Intelligence: From Secrets to Policy 8th ed. (Los Angeles: Sage, 2020)
Christopher Andrew, Richard Aldrich and Wesley Wark (eds), Secret Intelligence: A reader 2nd edition (London: Routledge, 2020)
Chapple, M., Stewart, J. M., Gibson, D. (2018) CISSP Official Study Guide, Sybex. ISBN: 978-111947-593-4
Chio, C. (2018) Machine Learning and Security. O’Reilly, ISBN: 978-1491979907
Sutton, D. (2017) Cybersecurity: A practitioner’s guide. BCS, The Chartered Institute for It. ISBN-13:¿978-1-78017-340-5
MODULE RESOURCES
Library, rooms with digital presentation capability.
Access to Virtual Machines (VM’s) and scanning tools within a logically closed environment.