Show/hide contentOpenClose All
Curricular information is subject to change
• Understand Information Security
• Identify Security concerns in the design and implementation of secure systems
• Understand and apply Security models and design principles
• Understand
o Role of cryptography and security protocols
o Privilege management access control
o Common software and network vulnerabilities
o Usable security and the human factor
• Discuss the concepts of Privacy VS Surveillance
• Undertake real world case studies in information security
• Introduction Information Security
o What is it
o Threats
o Information Security and Computer Forensics
• Security and the design and implementation of secure systems
• Security models and design principles (e.g., principle of least privilege and fail-safe defaults)
• Introduction to Cryptography and security protocols
• Access control
• Common software and network vulnerabilities
• Usable security and the human factor
• Privacy VS Surveillance
• Real world case studies
Approaches to information security in different organisations
Recommendations for your organisation or an organisation of interest to you
Student Effort Type | Hours |
---|---|
Lectures | 24 |
Practical | 36 |
Autonomous Student Learning | 150 |
Total | 210 |
Not applicable to this module.
Description | Timing | Component Scale | % of Final Grade | ||
---|---|---|---|---|---|
Examination: An end of trimester MCQ exam | End of trimester MCQ | No | Standard conversion grade scale 40% | No | 30 |
Journal: Students will maintain a Learning Journal where they will respond to regular questions posted on BrightSpace during the trimester. | Throughout the Trimester | n/a | Standard conversion grade scale 40% | No | 70 |
Remediation Type | Remediation Timing |
---|---|
In-Module Resit | Prior to relevant Programme Exam Board |
• Feedback individually to students, post-assessment
The lecturer will provide either written or oral feedback to the students
Name | Role |
---|---|
Kushal Ramkumar | Tutor |