Information, Network & Cyber Security



Similar documents
Curran, K. Tutorials. Independent study (including assessment) N/A

Network Security Essentials:

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

Weighted Total Mark. Weighted Exam Mark

RYERSON UNIVERSITY Ted Rogers School of Information Technology Management And G. Raymond Chang School of Continuing Education

COMP-530 Cryptographic Systems Security *Requires Programming Background. University of Nicosia, Cyprus

MS Information Security (MSIS)

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification

TIME SCHEDULE. 1 Introduction to Computer Security & Cryptography 13

Information Security Course Specifications

COSC 472 Network Security

Introduction to Cyber Security / Information Security

Govt. of Karnataka, Department of Technical Education Diploma in Computer Science & Engineering. Sixth Semester

CPSC 467: Cryptography and Computer Security

CRYPTOGRAPHY AND NETWORK SECURITY

Information Security

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings

Networked Systems Security

Syllabus. No: CIS 200. Title: Fundamentals of Network Security. Credits: 4. Coordinator: Dr. B. Dike-Anyiam, Computer Science & Networking Lecturer

External Supplier Control Requirements

(IŞIK - IT201) 1 / 6 COURSE PROFILE. Theory+PS+Lab (hour/week) Local Credits. Course Name Code Semester Term ECTS

Major prerequisites by topic: Basic concepts in operating systems, computer networks, and database systems. Intermediate programming.

Network Security. Introduction. Università degli Studi di Brescia Dipartimento di Ingegneria dell Informazione 2014/2015

Department of Computer & Information Sciences. CSCI-445: Computer and Network Security Syllabus

FBLA Cyber Security aligned with Common Core FBLA: Cyber Security RST RST RST RST WHST WHST

NS - Network Security

Computer Security (EDA263 / DIT 641)

e-code Academy Information Security Diploma Training Discerption

City University of Hong Kong. Information on a Course offered by Department of Computer Science with effect from Semester A in 2014 / 2015

EC-Council. Certified Ethical Hacker. Program Brochure

Cryptography and Network Security Chapter 1

UVic Department of Electrical and Computer Engineering

EC Council Certified Ethical Hacker V8

Detailed Description about course module wise:

Programme Specification and Curriculum Map for MSc Network Security and Pen Testing

CSCI 454/554 Computer and Network Security. Instructor: Dr. Kun Sun

Cryptography and Network Security

CS 464/564 Networked Systems Security SYLLABUS

Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN

University of Wisconsin-Whitewater Curriculum Proposal Form #3 New Course

Computer and Network Security PG Unit Outline School of Information Sciences and Engineering

Basics of Internet Security

City University of Hong Kong. Information on a Course offered by Department of Electronic Engineering with effect from Semester A in 2012/2013

Certificate in Cyber Security

CSCI 4541/6541: NETWORK SECURITY

Logical Operations CyberSec First Responder: Threat Detection and Response (CFR) Exam CFR-110

Introduction to Security

Principles of Information Assurance Syllabus

CS 450/650 Fundamentals of Integrated Computer Security

Department of Computer & Information Sciences. INFO-450: Information Systems Security Syllabus

E-commerce. business. technology. society. Kenneth C. Laudon Carol Guercio Traver. Second Edition. Copyright 2007 Pearson Education, Inc.

Course Title: ITAP 3471: Web Server Management

CS Ethical Hacking Spring 2016

Network Security SWISS GERMAN UNIVERSITY. Administration Charles Lim

Course Outline Computing Science Department Faculty of Science. COMP Credits Computer Network Security (3,1,0) Fall 2015

Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus

Programme Specification and Curriculum Map for MSc Computer and Network Security

Notes on Network Security - Introduction

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

NIST Cyber Security Activities

Course Title: Penetration Testing: Communication Media Testing, 1st Edition

foresightconsulting.com.au

F21CN: Computer Network Security: Overview

CSE 5392 Sensor Network Security

Course mechanics. CS 458 / 658 Computer Security and Privacy. Course website. Additional communication

Bachelor of Information Technology (Network Security)

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

CRYPTUS DIPLOMA IN IT SECURITY

Mobile Office Security Requirements for the Mobile Office

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

CEH Version8 Course Outline

SECURITY PRACTICES FOR ADVANCED METERING INFRASTRUCTURE Elif Üstündağ Soykan, Seda Demirağ Ersöz , ICSG 2014

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

BSc (Hons) Sofware Engineering. Examinations for / Semester 2

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

ICANWK406A Install, configure and test network security

MSc Cyber Security. identity. hacker. virus. network. information

CS 458 / 658 Computer Security and Privacy. Course mechanics. Course website. Module 1 Introduction to Computer Security and Privacy.

Introduction to Computer Security

Network Security Course Specifications

Information Security Services

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

Part-time MSc in Cyber Security from Northumbria University. masters.qa.com

Allegany College of Maryland. 239 Cisco Networking 2 * Offered Fall semester and

Network Security Administrator

Information Security Basic Concepts

Network Security Policy

CIS 6930/4930 Computer and Network Security. Dr. Yao Liu

Transcription:

School COMSC Information, Network & Cyber Security Information security officers are faced with strategic decisions on a daily basis, and are required to make informed decisions on the security options relevant to business and organisational objectives. In modern organisations, the growth of distributed systems and cloud computing has led to the increasing and dynamic convergence of users and computers through computer networks connected by the Internet. This has led to an increase in attacks on organisations information systems in the form of viruses, worms and denial of service attacks. Attacks such as these can cripple an organisation, bringing its business process to a halt, and has the potential to expose and corrupt sensitive data that is managed within computer networks. Module Code CMT104 External Subject Code I260 Number of Credits 20 Level M Module Leader Pete Burnap Module offered on a freestanding basis? No Maximum Number on Module 32 Language of module delivery English This module focuses on the concepts of information security and privacy within the context of strategic information systems and also computer networks. This includes: the need to deter, prevent, detect and react to attacks on computer networks; attacks on information while in transmission between distributed networks; the risk to data stored in the cloud; and the risks to privacy in social networks and big data. The human factor also has a part to play in the increase in attacks and this is also discussed.

The module introduces the need for risk assessments and information security policies, standards, legal and ethical aspects of information security, as well as the technical concepts of cryptography for providing transport-level security for protecting communications between networks, types of network intrusion, types of malicious software, and computer network protection mechanisms. On completion of the module a student will be able to: Describe the key concepts of confidentiality, integrity and availability, and the relationship between them. Explain what is meant by authentication and non-repudiation, in the context of electronic transactions, and options for securing them. Describe approaches to determining the value of business assets, including information, and assessing the risks to them. Explain how to assess countermeasures to identified risks, and determine the cost-effectiveness of candidate measures. Describe national and international schemes for the evaluation of security products, and their relevance to organisational or business needs. Describe the purpose of a security policy in an organisation, and explain how to develop and implement such a policy. Reflect on the issues faced by multi-national organisations and their approaches to information risk. Analyse the relationship between security theory and security practice. Explain the relationship between prevention, detection and reaction. Reflect on the systemic nature of information security within a purposeful organisation. Understand and describe the types of attack that occur on computer networks and distributed systems. Explain the anatomy of a virus and how it spreads between connected information systems Identify, evaluate and recommend a selection of configurations and countermeasures to reduce the likelihood and impact of potential security attacks. Identify and evaluate the risks to computer networks emerging from Cloud computing and wireless connectivity. Explain the need for cryptography and its various algorithms and methods of use. Understand and explain the complexities of managing and authenticating identity between distributed networks. Understand how to detect and react to network intrusions.

How the module will be delivered The module employs a combination of theoretical and practical interactive contact sessions, using a study guide, a selection of papers, and textbooks. Students are expected to attend contact sessions comprising of laboratory classes, discussions, and material presentation by the module leader. Guest lecturers may also participate by giving short talks on their area of expertise. The practical sessions include hands-on experience of network sniffing and cryptographic exercises to preserve the security of information being sent between computer networks. Skills that will be practised and developed Students will be able to demonstrate the ability to complete a security risk analysis, and produce a draft security policy, for a purposeful organisation. This will require the ability to work as a team. Students will also understand how computer networks are configured and where their vulnerabilities lie. They will be able to deploy tools and techniques that will protect and defend information from attack. They will also understand the issues related to the expansion of the traditional computer network as systems become more integrated and distributed between organisations. How the module will be assessed A written examination will test the student s knowledge and understanding of the theoretical aspects of the course. The coursework will be a practical laboratory based exercise that will test their ability to implement some of the taught course content. Type of assessment % Contributi on Title Duration (if applicable ) Approx. date of Assessment Coursework 30% Report Week 3 (out) Week 5 (in) coursework 70% Practical group exercise Week 6 (out) Week 11 (in)

The potential for reassessment in this module Reassessment will take the form of a re-sit examination. Syllabus content Introduction to Information Security. Security concepts, standards, and codes of practice. Identification of business critical processes and assets. Risk assessment and countermeasures. Organisation aspects of information security and security policies. Assurance/accreditation issues. Introduction to Computer Networks. Cryptography for Confidentiality and Authentication. User Authentication. Transport-Level Security. Wireless Network Security. IP Security. Intrusion Types and Methods. Malicious Software and Viruses. Firewalls. Indicative Reading and Resource List: Security Engineering, 2nd Edition, Anderson, R J, ISBN 978-0-470-06852-6, John Wiley Secrets and Lies: Digital Security in a Networked World, Schneier, B, ISBN 0-471-25311-1, Chichester, John Wiley. Schneier on Security, Schneier B., ISBN 978-0-470-39535-6, Indianapolis, Indiana, Wiley Publishing Inc. W. Stallings. Network Security Essentials. Pearson. 2011

Security 2020. Howard, D and Prince, K. Wiley. 2011