Module overview
Aims and Objectives
Learning Outcomes
Knowledge and Understanding
Having successfully completed this module, you will be able to demonstrate knowledge and understanding of:
- The cyber threat landscape, both in terms of recent emergent issues and those issues which recur over time
- The roles ad influences of governments, commercial and other organisations, citizens and criminals in cyber security affairs
- The potentialities and challenges of emerging blockchain technology to enhance inter-organisation trust and data/processing integrity
- General principles and strategies that can be applied to systems to make them more robust to attack
- Issues surrounding privacy and anonymity
- The importance of taking a multi-disciplinary approach to cyber security
Subject Specific Intellectual and Research Skills
Having successfully completed this module you will be able to:
- critically analyse a cyber attack and identify effective countermeasures
Syllabus
The syllabus includes the following topics:
oFundamental Security Concepts
oCyber Actors
oKill-Chain Cyber Attack Life Cycle
oCyber Attacks
oCyber Threat Landscape
oCorporate security
oAdvanced Persistent Threats
oSocial Engineering
oCyberwarfare
oHacktivism
oSecurity of Critical infrastructures
oPrinciples of Cryptography
oPublic Key Infrastructure
oSecure Communication
oUser Authentication
oPrivacy and Data Anonymisation
oAccess Control Models
oBlockchain
Learning and Teaching
Teaching and learning methods
Lectures will be given by subject matter experts from the disciplines involved. Staff and resources from the University's Academic Centre of Excellence in Cyber Security Research will contribute to the module.
Type | Hours |
---|---|
Revision | 15 |
Lecture | 36 |
Independent Study | 64 |
Completion of assessment task | 35 |
Total study time | 150 |
Resources & Reading list
Textbooks
Andress, J. (2013). Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners. Syngress.
Graham, J., Howard, R. and Olson, R. (2011). Cyber Security Essentials. CRC Press.
Hadnagy, C (2011). Social Engineering: The Art of Human Hacking. Wiley.
Clarke, R.A. (2012). Cyber War: The Next Threat to National Security and What to Do about it. ECCO Press.
Assessment
Summative
This is how we’ll formally assess what you have learned in this module.
Method | Percentage contribution |
---|---|
Examination | 70% |
Coursework | 30% |
Referral
This is how we’ll assess you if you don’t meet the criteria to pass this module.
Method | Percentage contribution |
---|---|
Examination | 100% |
Repeat
An internal repeat is where you take all of your modules again, including any you passed. An external repeat is where you only re-take the modules you failed.
Method | Percentage contribution |
---|---|
Examination | 100% |
Repeat Information
Repeat type: Internal & External