COMP2216 Principles of Cyber Security
Module Overview
Aims and Objectives
Learning Outcomes
Knowledge and Understanding
Having successfully completed this module, you will be able to demonstrate knowledge and understanding of:
- The importance of taking a multi-disciplinary approach to cyber security
- The cyber threat landscape, both in terms of recent emergent issues and those issues which recur over time
- The roles ad influences of governments, commercial and other organisations, citizens and criminals in cyber security affairs
- General principles and strategies that can be applied to systems to make them more robust to attack
- Issues surrounding privacy and anonymity
- The potentialities and challenges of emerging blockchain technology to enhance inter-organisation trust and data/processing integrity
Subject Specific Intellectual and Research Skills
Having successfully completed this module you will be able to:
- critically analyse a cyber attack and identify effective countermeasures
Syllabus
The syllabus includes the following topics: o Fundamental Security Concepts o Cyber Actors o Kill-Chain Cyber Attack Life Cycle o Cyber Attacks o Cyber Threat Landscape o Corporate security o Advanced Persistent Threats o Social Engineering o Cyberwarfare o Hacktivism o Security of Critical infrastructures o Principles of Cryptography o Public Key Infrastructure o Secure Communication o User Authentication o Privacy and Data Anonymisation o Access Control Models o Blockchain
Learning and Teaching
Teaching and learning methods
Lectures will be given by subject matter experts from the disciplines involved. Staff and resources from the University's Academic Centre of Excellence in Cyber Security Research will contribute to the module.
Type | Hours |
---|---|
Lecture | 36 |
Independent Study | 64 |
Revision | 15 |
Completion of assessment task | 35 |
Total study time | 150 |
Resources & Reading list
Graham, J., Howard, R. and Olson, R. (2011). Cyber Security Essentials.
Hadnagy, C (2011). Social Engineering: The Art of Human Hacking.
Andress, J. (2013). Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners.
Clarke, R.A. (2012). Cyber War: The Next Threat to National Security and What to Do about it.
Assessment
Summative
Method | Percentage contribution |
---|---|
Continuous Assessment | 30% |
Final Assessment | 70% |
Repeat
Method | Percentage contribution |
---|---|
Set Task | 100% |
Referral
Method | Percentage contribution |
---|---|
Set Task (2 hours) | 100% |
Repeat Information
Repeat type: Internal & External