Last modified: 27 Feb 2018 14:47
This course provides a comprehensive introduction to techniques for engineering secure information systems. Identity theft and fraudulent scams are some examples where computer systems have been utilised and compromised, and information exploited in ways not intended or authorized. In addition to developing critical knowledge of the theories, principles and concepts associated with information security and systems, this course will enhance your understanding of core topics such as access control, usability and psychology, security policy, ethical hacking, and cryptography. Students study how users and organisations must become better prepared to best exploit emerging technologies and issues arising.
Study Type | Postgraduate | Level | 5 |
---|---|---|---|
Term | First Term | Credit Points | 15 credits (7.5 ECTS credits) |
Campus | Online | Sustained Study | No |
Co-ordinators |
|
Topics will include:
1. The information security landscape;
2. Access control;
3. Usability and psychology;
4. Cryptography (symmetric);
5. Protocols and keys;
6. Network attack and defence;
7. Security policy;
8. Cryptography (asymmetric);
9. Development of systems and software with security considerations;
10. Evaluation, Assurance, Compliance;
11. The Economics of Security;
12. The wider implications of security and a look at the future of security.
Information on contact teaching time is available from the course guide.
1st Attempt: 1 two-hour written examination (75%); continuous assessment (25%)
Resit: Candidates only resit those components (written examination, continuous assessment) which they failed at first attempt. Written examination at resit is 1 two-hour paper.
There are no assessments for this course.
We have detected that you are have compatibility mode enabled or are using an old version of Internet Explorer. You either need to switch off compatibility mode for this site or upgrade your browser.