Information security is about protecting information (and information systems) against unauthorised access and tampering. Avoiding security breaches has a high priority for organisations storing and handling confidential data. This module provides students with an introduction to information security. This covers technical aspects, such as cryptography, but also extends to management aspects, such as security policies, as having the technical infrastructure in place is only part of the solution. Students will learn how to employ technical solutions effectively in an organisation-wide context.
- Overview of Information Security
- Access Control Matrix Model
- Security Policies
- Social Engineering
- Basic Cryptography
- Identity Management
- Access Control Mechanisms
- Assurance and Trust
- Network Intruders and Intrusion Detection
- Firewalls and Malicious Software
- Cryptographic Protocol Concepts
Timetables, locations and term dates
Programme specific timetables are listed in the handbooks available for each programme. Please consult the relevant programme page.
- Term dates and holiday closing
- Timetable listing modules by term and day of the week
- Timetable and venue information for the week ahead
Enrolled students can find their personal teaching timetable and the location of classes on their My Birkbeck profile.
Two-hour written examination (80%) and practical coursework (20%).
- Keith M. Martin, Everyday Cryptography: Fundamental Principles and Applications, 2012, ISBN 978-0-19-969559-1
- Ross Anderson, Security Engineering 2nd edition, John Wiley & Sons, 2008, ISBN 978-0-470-06852-6
- William Stallings, Cryptography and Network Security 5th edition, Pearson, 2010, ISBN 978-0136097044
- Matt Bishop, Computer Security: Art and Science, Addison-Wesley, 2002, ISBN 978-0201440997
- Bruce Schneier, Applied Cryptography, John Wiley & Sons, 1996, ISBN 0-471-11709-9