Learning Outcomes:
• Understand Information Security
• Identify Security concerns in the design and implementation of secure systems
• Understand and apply Security models and design principles
• Understand
o Role of cryptography and security protocols
o Privilege management access control
o Common software and network vulnerabilities
o Usable security and the human factor
• Discuss the concepts of Privacy VS Surveillance
• Undertake real world case studies in information security
Indicative Module Content:
• Introduction Information Security
o What is it
o Threats
o Information Security and Computer Forensics
• Security and the design and implementation of secure systems
• Security models and design principles (e.g., principle of least privilege and fail-safe defaults)
• Introduction to Cryptography and security protocols
• Access control
• Common software and network vulnerabilities
• Usable security and the human factor
• Privacy VS Surveillance
• Real world case studies
Approaches to information security in different organisations
Recommendations for your organisation or an organisation of interest to you