CC3101 - Cyber Security Fundamentals (2024/25)
Module specification | Module approved to run in 2024/25 | ||||||||||||
Module title | Cyber Security Fundamentals | ||||||||||||
Module level | Foundation (03) | ||||||||||||
Credit rating for module | 30 | ||||||||||||
School | School of Computing and Digital Media | ||||||||||||
Total study hours | 300 | ||||||||||||
|
|||||||||||||
Assessment components |
|
||||||||||||
Running in 2024/25(Please note that module timeslots are subject to change) |
|
Module summary
On this module students will learn the fundamental knowledge concerning computer security, basic cyber threats and the corresponding detection and defence techniques. Core security concepts, terminology, technologies and professional cyber security skills will be introduced via case studies and laboratory experiments.
Syllabus
Introduction to cyberspace and cyber security: computer security, web security, operating system security, wireless/network security, mobile security, programming security.
Concepts and terminology of cyber security: basics of encryption and cryptography, virtual platform, cloud, protocols, hacking, malware, virus, botnets, pentest, information security practice/standards.
Basic coverage of security software: anti-virus software, packet sniffers, anti-spyware, intrusion detection/protection software, digital forensics software, pentest software.
Introductory overview of network security: types of networks, network protocols, network security and protection, VPNs, firewall configuration/maintenance, network intrusion and detection systems.
Basics of digital forensics: computer crime investigation and its legal issues, use of digital forensic tools and applications.
The human factor in security: authorisation mechanisms, usability issues, risk analysis and control, cyber-ethics, cyber bullying, social media attacks.
Learning Outcomes LO1 - LO5
Balance of independent study and scheduled teaching activity
Students will develop understanding and practical investigative skills based on weekly lectures, tutorials and supervised workshops. The teaching sessions will utilise examples/case studies as a platform for understanding security threats and how to counter them. The workshops, in particular, are provided to support students in gaining practical experience in computer security and digital forensic investigations, within a dedicated laboratory.
Appropriate blended learning approaches and technologies, such as, the University’s VLE and computer security tools, will be used to facilitate and support student learning, in particular, to:
• deliver content;
• encourage active learning;
• provide formative and summative assessments, and prompt feedback;
• enhance student engagement and learning experience.
Students will be expected and encouraged to produce reflective commentaries on the learning activities and tasks that they carry out to complete their work.
Students will be expected and encouraged to produce reflective commentaries and an action plan for personal development on the learning activities and tasks that they carry out to complete their work, e.g. in the form of an assessed section of their coursework report/essay
Learning outcomes
On successful completion of this module, students should be able to:
LO1: understand the basic concepts, terminology and technologies of cyber security;
LO2: develop a basic knowledge of cyber threats and the corresponding detection and defence techniques;
LO3: consider the human factor in computer security;
LO4:acquire an appreciation of different types and use of available security software;
LO5: understand at an introductory level the forensic and investigative aspects of countering cyber-attacks.
LO6: reflect on their learning and development within the context of cyber security.
Bibliography
Cyber security management: a governance, risk and compliance framework - Peter R. J.
Trim, Yang-Im Lee, 2014
Book | Additional Reading
Cybersecurity for beginners - Raef Meeuwisse, March 2017
Book | Additional Reading
Cybersecurity: the essential body of knowledge - Dan Shoemaker, Wm. Arthur Conklin,
2012
Book | Additional Reading
Journals: Taylor and Francis online Journal
Websites:
Lynda.com
Department for Business, Innovation and Skills. (2020). CyberSecurity.Available: https://www.gov.uk/government/publications/cyber-essentials-scheme-overview. Last accessed 05/10/20
Web Editor. (2020). All. Available: https://www.ncsc.gov.uk/cyberaware/home Last accessed 05/10/20.
Web Editor. (2020). All. Available: http://thehackernews.com/. Last accessed 05/10/20.
.
Web Editor. (2020). All. Available: http://www.bloomberg.com/topics/cybersecurity. Last accessed 05/10/20.
Regular cyber security related articles from the BCS, Chartered Institute of IT, publication ITNOW will be made available to students.
Electronic Databases: ACM Digital Library, IEEE Xplore/IET Digital Library