Information security is about protecting information (and information systems) against unauthorised access and tampering. Avoiding security breaches has a high priority for organisations storing and handling confidential data. This module provides students with an introduction to information security. This covers technical aspects, such as cryptography, but also extends to management aspects, such as security policies, as having the technical infrastructure in place is only part of the solution. Students will learn how to employ technical solutions effectively in an organisation-wide context.
- Overview of Information Security
- Access Control Matrix Model
- Security Policies
- Social Engineering
- Basic Cryptography
- Identity Management
- Access Control Mechanisms
- Assurance and Trust
- Network Intruders and Intrusion Detection
- Firewalls and Malicious Software
- Cryptographic Protocol Concepts
All dates and timetables are listed in the programme handbooks of individual programmes.
Two-hour written examination (80%) and practical coursework (20%).
- Keith M. Martin, Everyday Cryptography: Fundamental Principles and Applications, 2012, ISBN 978-0-19-969559-1
- Ross Anderson, Security Engineering 2nd edition, John Wiley & Sons, 2008, ISBN 978-0-470-06852-6
- William Stallings, Cryptography and Network Security 5th edition, Pearson, 2010, ISBN 978-0136097044
- Matt Bishop, Computer Security: Art and Science, Addison-Wesley, 2002, ISBN 978-0201440997
- Bruce Schneier, Applied Cryptography, John Wiley & Sons, 1996, ISBN 0-471-11709-9