Ensuring the security of computer systems is of paramount importance for both individuals and organisations, safeguarding the integrity of a broad spectrum of sensitive data such as personal and financial details, medical records, research databases and more. The potential consequences of damage or loss, whether accidental or due to malicious attacks, extend to affecting intricate and potentially hazardous hardware, posing severe threats to the existence of organisations. This module underscores the need for comprehensive security measures ingrained in systems, covering hardware, software, and addressing both physical and human aspects. Designers and implementers of computer security systems must possess technical expertise and an understanding of the human dimension. The imperative lies not only in creating suitable and cost-effective security measures but also in diligently implementing them. Given the dynamic nature of threats, this module empowers students to adapt by exploring technical aspects with depth and presenting practical techniques and algorithms crucial for the efficient, secure operation of communication systems in cyberspace. The module also acknowledges human considerations, recognising the pivotal role of human factors in ensuring robust and resilient computer security at both personal and policy levels.
The learning and teaching method for this module is centred on a series of predominantly practical guided activities, initiated by short theoretical introductions. Understanding real-world cyber security challenges helps students appreciate the importance and urgency of protecting digital assets. Case studies and simulations can be used to explore recent cyber attacks and security breaches, teaching students to recognise vulnerabilities and apply appropriate countermeasures. The goal is to develop the students’ critical perspective while gaining up-to-date domain knowledge through practical work. Each session includes preliminary exercises and readings based on online materials conducted by students on their own. After the workshop, students individually consolidate their understanding through additional activities and further readings.
Workshops
Hours 40
Group Size All Cohort
Guided independent study
Hours: 260
Cyber Security Case Study: Students are individually tasked with investigating a supplied case study.
Cyber Security Practical Activity: This individual assessment is a practical piece of work, such as a Capture the Flag exercise or a Vulnerability, Threat Modelling and Risk task.
In computer science classes, formative assessment serves to bolster the skills essential for module success. This includes engaging in practical labs, undertaking design and modelling tasks, delivering case study presentations, completing short quizzes and conducting specific investigation tasks. The provision of formative feedback is integrated seamlessly into class sessions, ensuring an ongoing and iterative process to enhance learning outcomes.
Full details are available in the Module Handbook.
001 Cyber security case study; 1600 word equiv; mid semester 1 40%
002 Cyber security practical activity; 2400 word equiv; end of semester 2 60%
Module Coordinator - Antesar Shabut
Level - 6
Credit Value - 30
Pre-Requisites -
Semester(s) Offered - 6YL