Last modified: 31 May 2022 13:05
This course provides a comprehensive introduction to techniques for engineering secure information systems. Identity theft and fraudulent scams are some examples where computer systems have been utilised and compromised, and information exploited in ways not intended or authorized. In addition to developing critical knowledge of the theories, principles and concepts associated with information security and systems, this course will enhance your understanding of core topics such as access control, usability and psychology, security policy, ethical hacking, and cryptography. Students study how users and organisations must become better prepared to best exploit emerging technologies and issues arising.
|Session||First Sub Session||Credit Points||15 credits (7.5 ECTS credits)|
Topics will include:
1. The information security landscape;
2. Access control;
3. Usability and psychology;
4. Cryptography (symmetric);
5. Protocols and keys;
6. Network attack and defence;
7. Security policy;
8. Cryptography (asymmetric);
9. Development of systems and software with security considerations;
10. Evaluation, Assurance, Compliance;
11. The Economics of Security;
12. The wider implications of security and a look at the future of security.
Information on contact teaching time is available from the course guide.
There are no assessments for this course.
|Assessment Weeks||Feedback Weeks|
|Knowledge Level||Thinking Skill||Outcome|
|Factual||Remember||ILO’s for this course are available in the course guide.|