Last modified: 26 Oct 2022 12:01
This course provides a comprehensive introduction to techniques for engineering secure information systems. Identity theft and fraudulent scams are some examples where computer systems have been utilised and compromised, and information exploited in ways not intended or authorized. In addition to developing critical knowledge of the theories, principles and concepts associated with information security and systems, this course will enhance your understanding of core topics such as access control, usability and psychology, security policy, ethical hacking, and cryptography. Students study how users and organisations must become better prepared to best exploit emerging technologies and issues arising.
Study Type | Postgraduate | Level | 5 |
---|---|---|---|
Session | First Sub Session | Credit Points | 15 credits (7.5 ECTS credits) |
Campus | Aberdeen | Sustained Study | No |
Co-ordinators |
|
Topics will include:
1. The information security landscape;
2. Access control;
3. Usability and psychology;
4. Cryptography (symmetric);
5. Protocols and keys;
6. Network attack and defence;
7. Security policy;
8. Cryptography (asymmetric);
9. Development of systems and software with security considerations;
10. Evaluation, Assurance, Compliance;
11. The Economics of Security;
12. The wider implications of security and a look at the future of security.
Information on contact teaching time is available from the course guide.
2-hour Exam (75%)
Individual Report (15%)
Coursework (10%)
Resit
Exam (2 hours). Best of (resit exam mark) or (resit exam mark with carried forward CA marks)
There are no assessments for this course.
Knowledge Level | Thinking Skill | Outcome |
---|---|---|
Factual | Remember | ILO’s for this course are available in the course guide. |
We have detected that you are have compatibility mode enabled or are using an old version of Internet Explorer. You either need to switch off compatibility mode for this site or upgrade your browser.