COMP08180 2021 Computer Security and Cryptography
Learners will examine cyber security in relation to a business environment. In particular, the module will explore specific attacks, attackers motives and threat modelling in a business environment. The learner will critically evaluate the challenges in relation to cyber security and the consequences of a data breach for an organisation. The learner will explore and evaluate different cryptographic systems and how they differ from each other.
Learning Outcomes
On completion of this module the learner will/should be able to;
Evaluate and explore the term Cyber Security and its relevance in a business environment
Analyse security issues, analyse ways businesses can mitigate against security issues and illustrate consequences of security breaches for an organisation
Examine the components of a cryptosystem and analyse different cryptographic attacks
Examine and analyse the principles of Cryptography
Teaching and Learning Strategies
Lectures will be used to present the material throughout the module and laboratory exercises will be used to reinforce the learning experience.
Module Assessment Strategies
Students will be accessed through the application of techniques using case studies/practical elements which will require application of content covered. Understanding of theoretical concepts will be assessed via an end of module examination.
Repeat Assessments
Repeat failed elements
Indicative Syllabus
1. Evaluate and explore the term Cyber Security and its' relevance in a business environment
- Introduction to Cyber Security
- Introduction to terminology/types of actors - Hackers, crackers, cyber criminals etc..
- Security threats and attacks
- Threat modelling and risk assessments
- Security standards
- Ethics in Cyber Security
2. Analyse security issues, analyse ways businesses can mitigate against security issues and illustrate consequences of security breaches for an organisation
- Types of security issues to affect businesses (Malware, viruses, rootkits, RATs, Spyware, adware, phishing, social engineering, darknet, Ransomware etc..)
- Authentication in systems
- CIA triage
- Mitigating strategies for businesses
- Best practices in relation to security
- Risk management (separation of duties, job rotation, acceptable use policy, security policies, secure coding etc..)
- Consequences of a data breach for organisations
- Incident detection and response
3. Examine the components of a cryptosystem and analyse different cryptographic attacks
- Evolution of cryptography systems
- Fundamentals of cryptographic systems
- Terminology (Hashing, salt, IV, nonce etc..)
- Basic model of a cryptosystem
- Types of cryptographic attacks (Birthday attacks, known plain text/cipher text, rainbow tables, dictionary attacks, brute force, collision, replay etc..)
4. Examine and analyse the principles of Cryptography
- Block & stream ciphers
- Symmetric algorithms
- Asymmetric algorithms
- Public key cryptography
- Steganography
- Obfuscation
Coursework & Assessment Breakdown
Coursework Assessment
Title | Type | Form | Percent | Week | Learning Outcomes Assessed | |
---|---|---|---|---|---|---|
1 | Practical Assessment | Coursework Assessment | Closed Book Exam | 25 % | Week 6 | 2 |
2 | Practical Assessment | Coursework Assessment | Closed Book Exam | 25 % | Week 10 | 4 |
End of Semester / Year Assessment
Title | Type | Form | Percent | Week | Learning Outcomes Assessed | |
---|---|---|---|---|---|---|
1 | Final Written Exam | Final Exam | Closed Book Exam | 50 % | Week 12 | 1,2,3,4 |
Full Time Mode Workload
Type | Location | Description | Hours | Frequency | Avg Workload |
---|---|---|---|---|---|
Lecture | Online | Lecture | 1 | Weekly | 1.00 |
Practical / Laboratory | Computer Laboratory | Practical | 2 | Weekly | 2.00 |
Independent Learning | Not Specified | Independent Learning | 4 | Weekly | 4.00 |
Required & Recommended Book List
2019-01-29 The Secret to Cybersecurity Forefront Books
ISBN 1948677083 ISBN-13 9781948677080
Cyber crimes are a threat and as dangerous as an armed intruderyet millions of Americans are complacent, unknowing, or simply ignorant of how to protect themselves. The Secret to Cybersecurity closes that knowledge gap by using real-life examples to educate readers how to protect themselves in very simple ways. Its 2 a.m.do you know who your child is online with? According to author Scott Augenbaum, between 80 to 90 percent of students say they do whatever they want on their smartphonesand their parents dont have a clue. Is that you? What about your online banking passwords, are they safe? Your weaknesses are not always what you think they are. There are bad people in the world, and they are on the internet. They want to hurt you. They are based all over the world, so theyre hard at work when even youre sleeping. They use automated programs to probe for weaknesses in your internet security programs. And they never stop. Cyber crimes is on the increase internationally, and its up to you to protect yourself. But how? The Secret to Cybersecurity is the simple and straightforward plan to keep you and your family safe. Written by Scott Augenbaum, a 30-year veteran of the FBI who specialized in cyber crimes, it uses real-life examples to educate and inform readers, explaining who/why/how so youll have a specific takeaway to put into action for your family. Learn about the scams, methods, and ways that cyber criminals operateand learn how to fight back.
2004-01-30 Cryptography For Dummies For Dummies
ISBN 0764541889 ISBN-13 9780764541889
Cryptography is the most effective way to achieve data security and is essential to e-commerce activities such as online shopping, stock trading, and banking This invaluable introduction to the basics of encryption covers everything from the terminology used in the field to specific technologies to the pros and cons of different implementations Discusses specific technologies that incorporate cryptography in their design, such as authentication methods, wireless encryption, e-commerce, and smart cards Based entirely on real-world issues and situations, the material provides instructions for already available technologies that readers can put to work immediately Expert author Chey Cobb is retired from the NRO, where she held a Top Secret security clearance, instructed employees of the CIA and NSA on computer security and helped develop the computer security policies used by all U.S. intelligence agencies