Skip to main content

Information Security (Level 5)

Overview

  • Credit value: 15 credits at Level 5
  • Convenor: Donal Fernandes
  • Assessment: a 3000-word report based on learnings from weeks 1 to 4 (50%) and another 3000-word report based on learnings from weeks 5 to 9 (50%)

Module description

In this module we introduce you to information security, i.e. how to protect information and information systems against unauthorised access and tampering. Avoiding security breaches has a high priority for all organisations storing and handling confidential data. We will cover technical aspects such as firewalls, access control and cryptography, and organisational issues such as security policies.

The goal of this module is to enable you to learn how to employ technical solutions effectively in an organisation-wide context.

Indicative syllabus

  • The economic impact of hacking and data breaches
  • Information security basics
  • Security policies and formal models
  • Assurance and trust
  • Network intruders and intruder detection
  • Access control mechanisms
  • Firewalls and malicious software
  • Encryption
  • Social engineering
  • Biometrics

Learning objectives

By the end of this module you will be able to:

  • understand the basic facts, concepts and principles of information security, including the economic impact of hacking and data breaches
  • recognise the fundamental principles of cryptography
  • discuss and explain basic security-related policies and formal models
  • identify how cryptography fits into the broader context of information security
  • understand and evaluate basic arguments and evidence related to information security, including assurance and trust
  • compare and select between different security policies
  • compare different approaches to information security, such as network intruders and intruder detection, access control mechanisms and firewalls and malicious software and make informed decisions
  • apply basic knowledge of information security in practical lab sessions, including encryption and biometrics.