Aims
Knowledge and Understanding
Having successfully completed this module, you will be able to demonstrate knowledge and understanding of:
-
The importance of taking a multi-disciplinary approach to cyber security
-
The cyber threat landscape, both in terms of recent emergent issues and those issues which recur over time
-
The roles and influences of governments, commercial and other organisations, citizens and criminals in cyber security affairs
-
General principles and strategies that can be applied to systems to make them more robust to attack
-
Key factors in cyber security from different disciplinary views including computer science, management, law, criminology, and social sciences.
-
Issues surrounding privacy, anonymity and pervasive passive monitoring
Subject Specific Intellectual
Having successfully completed this module, you will be able to:
-
Analyse case studies, to reinforce the different disciplinary perspectives of cyber security
The syllabus includes the following topics:
- The cyber security threat landscape; history and evolution;
- Security surfaces; intelligence, case studies, trend analysis;
- Actors in cyber security; governments, organisations, citizens, criminals;
- The multidisciplinary nature of cyber security;
- ISPs as intermediaries; DPI;
- Principles of secure communications; digital signatures, PKI, encryption, hashing.
- Cryptography; crypto-primitives and ciphers;
- Introduction to biometrics;
- Privacy and anonymity protocols;
- Crowds, onion routing, ToR;
- Data management - anonymisation and de-anonymisation;
- Access control; authentication techniques;
- Passwords and password analysis;
- Social engineering; phishing;
- Security assurance and evaluation;
- Offensive cyber-attacks; cyber war; hacktivism;
- Advanced Persistent Threats;
- Critical infrastructures;
- Security aspects of social networks, the web science perspective;
- Management of cyber risks;
- Multilevel security; security policies;
- Security economics; investment, cost of breach;
- Cyber law, regulating the online environment;
- Computer access offences, data protection law;
Assessment methods
Method | Hours | Percentage contribution |
Coursework related to the foundations of Cyber security | - | 30% |
Exam | 120 mins hours | 70% |
Referral Method: By examination