production
Skip to Content

CS4028: SECURITY (2022-2023)

Last modified: 09 Jun 2023 15:16


Course Overview

The course provides a solid foundation in computer and information security. It will cover topics of Information and Risk, Threats and Attacks, Cybersecurity Architecture and Operations, Secure Systems and Products, Cybersecurity Management and Trustworthy Software. 

Course Details

Study Type Undergraduate Level 4
Session First Sub Session Credit Points 15 credits (7.5 ECTS credits)
Campus Aberdeen Sustained Study No
Co-ordinators
  • Dr Matthew Collinson
  • Dr Robert Duncan

Qualification Prerequisites

  • One of Programme Level 3 or Programme Level 4 or Programme Level 5

What courses & programmes must have been taken before this course?

What other courses must be taken with this course?

None.

What courses cannot be taken with this course?

Are there a limited number of places available?

No

Course Description

The course provides a solid foundation in computer and information security. It will cover the following topics:

  • Information and Risk,
      • including models such as confidentiality, integrity and availability (CIA); concepts such as probability, consequence, harm, risk identification, assessment and mitigation; and the relationship between information and system risk;
  • Threats and Attacks,
      • including threats, how they materialise, typical attacks and how those attacks exploit vulnerabilities;    
  • Cybersecurity Architecture and Operations, 
      • including physical and process controls that can be implemented across an organisation to reduce information and systems risk, identify and mitigate vulnerability, and ensure organisational compliance;    
  • Secure Systems and Products, 
      • including the concepts of design, defensive programming and testing and their application to build robust, resilient systems that are fit for purpose;
  • Cybersecurity Management, 
      • including understanding the personal, organisational and legal/regulatory context in which information systems could be used, the risks of such use and the constraints (such as time, finance and people) that may affect how cybersecurity is implemented;    
  • Trustworthy Software, 
      • being the enhancement of the overall software and systems culture, with the objective that software should be designed, implemented and maintained in a trustworthy manner, and including the British Standards Institution PAS 754 Software trustworthiness.
  • It may cover other topics if time allows.

Contact Teaching Time

Information on contact teaching time is available from the course guide.

Teaching Breakdown

More Information about Week Numbers


Details, including assessments, may be subject to change until 31 August 2023 for 1st half-session courses and 22 December 2023 for 2nd half-session courses.

Summative Assessments

Report: Individual

Assessment Type Summative Weighting 25
Assessment Weeks Feedback Weeks

Look up Week Numbers

Feedback
Learning Outcomes
Knowledge LevelThinking SkillOutcome
ConceptualUnderstandStudents will demonstrate mastery of core principles and concepts of information security engineering and management
ProceduralAnalyseDevelop ability to think analytically & creatively about security, including the ability for adversarial thinking & the ability to propose appropriate solutions involving people, process & technology
ProceduralApplyStudents will demonstrate the ability to apply relevant formal and semi-formal modelling techniques, and to perform relevant calculations
ProceduralEvaluateStudents will demonstrate an ability to perform an in-depth security analysis of a technology, and an ability to communicate the results effectively at an appropriate level of technical depth

Exam

Assessment Type Summative Weighting 75
Assessment Weeks Feedback Weeks

Look up Week Numbers

Feedback
Learning Outcomes
Knowledge LevelThinking SkillOutcome
ConceptualUnderstandStudents will demonstrate mastery of core principles and concepts of information security engineering and management
ProceduralAnalyseDevelop ability to think analytically & creatively about security, including the ability for adversarial thinking & the ability to propose appropriate solutions involving people, process & technology
ProceduralApplyStudents will demonstrate the ability to apply relevant formal and semi-formal modelling techniques, and to perform relevant calculations

Formative Assessment

There are no assessments for this course.

Resit Assessments

Exam

Assessment Type Summative Weighting 75
Assessment Weeks Feedback Weeks

Look up Week Numbers

Feedback
Learning Outcomes
Knowledge LevelThinking SkillOutcome
Sorry, we don't have this information available just now. Please check the course guide on MyAberdeen or with the Course Coordinator

Report: Individual

Assessment Type Summative Weighting 25
Assessment Weeks Feedback Weeks

Look up Week Numbers

Feedback
Learning Outcomes
Knowledge LevelThinking SkillOutcome
Sorry, we don't have this information available just now. Please check the course guide on MyAberdeen or with the Course Coordinator

Course Learning Outcomes

Knowledge LevelThinking SkillOutcome
ConceptualUnderstandStudents will demonstrate mastery of core principles and concepts of information security engineering and management
ProceduralAnalyseDevelop ability to think analytically & creatively about security, including the ability for adversarial thinking & the ability to propose appropriate solutions involving people, process & technology
ProceduralApplyStudents will demonstrate the ability to apply relevant formal and semi-formal modelling techniques, and to perform relevant calculations
ProceduralEvaluateStudents will demonstrate an ability to perform an in-depth security analysis of a technology, and an ability to communicate the results effectively at an appropriate level of technical depth

Compatibility Mode

We have detected that you are have compatibility mode enabled or are using an old version of Internet Explorer. You either need to switch off compatibility mode for this site or upgrade your browser.