Skip to main navigationSkip to main content
The University of Southampton
Courses

COMP2216 Principles of Cyber Security

Module Overview

Aims and Objectives

Learning Outcomes

Knowledge and Understanding

Having successfully completed this module, you will be able to demonstrate knowledge and understanding of:

  • The importance of taking a multi-disciplinary approach to cyber security
  • The cyber threat landscape, both in terms of recent emergent issues and those issues which recur over time
  • The roles ad influences of governments, commercial and other organisations, citizens and criminals in cyber security affairs
  • General principles and strategies that can be applied to systems to make them more robust to attack
  • Issues surrounding privacy and anonymity
  • The potentialities and challenges of emerging blockchain technology to enhance inter-organisation trust and data/processing integrity
Subject Specific Intellectual and Research Skills

Having successfully completed this module you will be able to:

  • critically analyse a cyber attack and identify effective countermeasures

Syllabus

The syllabus includes the following topics: o Fundamental Security Concepts o Cyber Actors o Kill-Chain Cyber Attack Life Cycle o Cyber Attacks o Cyber Threat Landscape o Corporate security o Advanced Persistent Threats o Social Engineering o Cyberwarfare o Hacktivism o Security of Critical infrastructures o Principles of Cryptography o Public Key Infrastructure o Secure Communication o User Authentication o Privacy and Data Anonymisation o Access Control Models o Blockchain

Learning and Teaching

Teaching and learning methods

Lectures will be given by subject matter experts from the disciplines involved. Staff and resources from the University's Academic Centre of Excellence in Cyber Security Research will contribute to the module.

TypeHours
Revision15
Lecture36
Completion of assessment task35
Independent Study64
Total study time150

Resources & Reading list

Graham, J., Howard, R. and Olson, R. (2011). Cyber Security Essentials. 

Hadnagy, C (2011). Social Engineering: The Art of Human Hacking. 

Andress, J. (2013). Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners. 

Clarke, R.A. (2012). Cyber War: The Next Threat to National Security and What to Do about it. 

Assessment

Summative

MethodPercentage contribution
Analysis and report 30%
Examination  (2 hours) 70%

Repeat

MethodPercentage contribution
Examination 100%

Referral

MethodPercentage contribution
Examination  (2 hours) 100%

Repeat Information

Repeat type: Internal & External

Share this module Share this on Facebook Share this on Twitter Share this on Weibo
Privacy Settings