Last modified: 15 Aug 2024 09:46
The course provides a solid foundation in computer and information security. It will cover topics of Information and Risk, Threats and Attacks, Cybersecurity Architecture and Operations, Secure Systems and Products, Cybersecurity Management and Trustworthy Software.
Study Type | Undergraduate | Level | 4 |
---|---|---|---|
Term | First Term | Credit Points | 15 credits (7.5 ECTS credits) |
Campus | Offshore | Sustained Study | No |
Co-ordinators |
|
The course provides a solid foundation in computer and information security. It will cover the following topics:
Information and Risk, including models such as confidentiality, integrity and availability (CIA); concepts such as probability, consequence, harm, risk identification, assessment and mitigation; and the relationship between information and system risk.
Threats and Attacks, including threats, how they materialise, typical attacks and how those attacks exploit vulnerabilities.
Cybersecurity Architecture and Operations, including physical and process controls that can be implemented across an organisation to reduce information and systems risk, identify, and mitigate vulnerability, and ensure organisational compliance.
Secure Systems and Products, including the concepts of design, defensive programming and testing and their application to build robust, resilient systems that are fit for purpose.
Cybersecurity Management, including understanding the personal, organisational and legal/regulatory context in which information systems could be used, the risks of such use and the constraints (such as time, finance and people) that may affect how cybersecurity is implemented.
Trustworthy Software, being the enhancement of the overall software and systems culture, with the objective that software should be designed, implemented, and maintained in a trustworthy manner, and including the British Standards Institution PAS 754 Software trustworthiness.
Information on contact teaching time is available from the course guide.
Assessment Type | Summative | Weighting | 75 | |
---|---|---|---|---|
Assessment Weeks | Feedback Weeks | |||
Feedback |
Knowledge Level | Thinking Skill | Outcome |
---|---|---|
Procedural | Analyse | Demonstrate mastery of core principles and concepts of information security engineering and management |
Procedural | Analyse | Perform an in-depth security analysis of a technology, and communicate the results effectively at an appropriate level of technical depth |
Procedural | Apply | Apply relevant formal and semi-formal modelling techniques, and perform relevant calculations |
Procedural | Create | Think analytically and creatively about security, including the ability for “adversarial thinking”, and the ability to propose appropriate solutions involving people, process and technology |
Assessment Type | Summative | Weighting | 25 | |
---|---|---|---|---|
Assessment Weeks | Feedback Weeks | |||
Feedback |
1,500-word essay |
Word Count | 1500 |
Knowledge Level | Thinking Skill | Outcome |
---|---|---|
Procedural | Analyse | Demonstrate mastery of core principles and concepts of information security engineering and management |
Procedural | Apply | Apply relevant formal and semi-formal modelling techniques, and perform relevant calculations |
Procedural | Create | Think analytically and creatively about security, including the ability for “adversarial thinking”, and the ability to propose appropriate solutions involving people, process and technology |
There are no assessments for this course.
Assessment Type | Summative | Weighting | ||
---|---|---|---|---|
Assessment Weeks | Feedback Weeks | |||
Feedback |
Knowledge Level | Thinking Skill | Outcome |
---|---|---|
|
Knowledge Level | Thinking Skill | Outcome |
---|---|---|
Procedural | Analyse | Demonstrate mastery of core principles and concepts of information security engineering and management |
Procedural | Create | Think analytically and creatively about security, including the ability for “adversarial thinking”, and the ability to propose appropriate solutions involving people, process and technology |
Procedural | Apply | Apply relevant formal and semi-formal modelling techniques, and perform relevant calculations |
Procedural | Analyse | Perform an in-depth security analysis of a technology, and communicate the results effectively at an appropriate level of technical depth |
We have detected that you are have compatibility mode enabled or are using an old version of Internet Explorer. You either need to switch off compatibility mode for this site or upgrade your browser.