CC3101 - Cyber Security Fundamentals (2021/22)
|Module specification||Module approved to run in 2021/22|
|Module title||Cyber Security Fundamentals|
|Module level||Foundation (03)|
|Credit rating for module||30|
|School||School of Computing and Digital Media|
|Total study hours||300|
|Running in 2021/22||
On this module students will learn the fundamental knowledge concerning computer security, basic cyber threats and the corresponding detection and defence techniques. Core security concepts, terminology, technologies and professional cyber security skills will be introduced via case studies and laboratory experiments.
Introduction to cyberspace and cyber security: computer security, web security, operating system security, wireless/network security, mobile security, programming security.
Concepts and terminology of cyber security: basics of encryption and cryptography, virtual platform, cloud, protocols, hacking, malware, virus, botnets, pentest, information security practice/standards.
Basic coverage of security software: anti-virus software, packet sniffers, anti-spyware, intrusion detection/protection software, digital forensics software, pentest software.
Introductory overview of network security: types of networks, network protocols, network security and protection, VPNs, firewall configuration/maintenance, network intrusion and detection systems.
Basics of digital forensics: computer crime investigation and its legal issues, use of digital forensic tools and applications.
The human factor in security: authorisation mechanisms, usability issues, risk analysis and control, cyber-ethics, cyber bullying, social media attacks.
Learning Outcomes LO1 - LO5
Balance of independent study and scheduled teaching activity
Students will develop understanding and practical investigative skills based on weekly lectures, tutorials and supervised workshops. The teaching sessions will utilise examples/case studies as a platform for understanding security threats and how to counter them. The workshops, in particular, are provided to support students in gaining practical experience in computer security and digital forensic investigations, within a dedicated laboratory.
Appropriate blended learning approaches and technologies, such as, the University’s VLE and computer security tools, will be used to facilitate and support student learning, in particular, to:
• deliver content;
• encourage active learning;
• provide formative and summative assessments, and prompt feedback;
• enhance student engagement and learning experience.
Students will be expected and encouraged to produce reflective commentaries on the learning activities and tasks that they carry out to complete their work.
Students will be expected and encouraged to produce reflective commentaries and an action plan for personal development on the learning activities and tasks that they carry out to complete their work, e.g. in the form of an assessed section of their coursework report/essay
On successful completion of this module, students should be able to:
LO1: understand the basic concepts, terminology and technologies of cyber security;
LO2: develop a basic knowledge of cyber threats and the corresponding detection and defence techniques;
LO3: consider the human factor in computer security;
LO4:acquire an appreciation of different types and use of available security software;
LO5: understand at an introductory level the forensic and investigative aspects of countering cyber-attacks.
LO6: reflect on their learning and development within the context of cyber security.
Students are assessed by three compulsory assessments [LO1-6].
The first compulsory assessment [LO1, LO6] is a 1-hour class test aimed at the student’s capability to understand material covered to date and also to receive feedback.
The second compulsory assessment [LO1-3, LO6] is an assignment based on the successful completion of a series of workshop tasks. It will allow students to demonstrate their awareness of the contexts in the detection and prevention of digital crimes. Students will produce a report (about 1500 words in total) detailing their findings of an investigation into an area relating to new technology crimes and their detection and prevention.
The third compulsory assessment [LO1-5], 1-hour exam, is designed to assess the understanding of fundamental concepts and their practical application.
Cyber security management: a governance, risk and compliance framework - Peter R. J.
Trim, Yang-Im Lee, 2014
Book | Additional Reading
Cybersecurity for beginners - Raef Meeuwisse, March 2017
Book | Additional Reading
Cybersecurity: the essential body of knowledge - Dan Shoemaker, Wm. Arthur Conklin,
Book | Additional Reading
Journals: Taylor and Francis online Journal
Department for Business, Innovation and Skills. (2020). CyberSecurity.Available: https://www.gov.uk/government/publications/cyber-essentials-scheme-overview. Last accessed 05/10/20
Web Editor. (2020). All. Available: https://www.ncsc.gov.uk/cyberaware/home Last accessed 05/10/20.
Web Editor. (2020). All. Available: http://thehackernews.com/. Last accessed 05/10/20.
Web Editor. (2020). All. Available: http://www.bloomberg.com/topics/cybersecurity. Last accessed 05/10/20.
Regular cyber security related articles from the BCS, Chartered Institute of IT, publication ITNOW will be made available to students.
Electronic Databases: ACM Digital Library, IEEE Xplore/IET Digital Library