Start a new search?
SCC.363: Security and Risk
|Department: Computing and Communications (School of)||NCF Level: FHEQ/QCF/NQF6//RQF6|
|Study Level: Part II (yr 3)||Credit Points: 15.0|
|Start Date: 09-10-2017||End Date: 27-04-2018|
|Available for Online Enrolment?: Y||Enrolment Restriction: Only available to students where listed in programme syllabus rules|
|Module Convenor: Dr B Zhang|
- Syllabus Rules and Lancaster Part II Pre-requisites
- Curriculum Design
- Assessment Weights
- Educational Aims
- Learning Outcomes
- Part 1 Modules Video
- Teaching Pattern
Syllabus Rules and Pre-requisites
- Prior to SCC.363, the student must have successfully completed:
Curriculum Design: Outline Syllabus
Topics to be covered wil include:
- Threat Analysis and Management Tools/Frameworks
- Attack Lifecycle and Processes
- Mitigation Mechanisms
- Network Security and Privacy
- OS Security
- Cyberphysical Security
- Cryptographic preliminaries
- Assurance Frameworks
Curriculum Design: Single, Combined or Consortial Schemes to which the Module Contributes
This module is:
(a) Optional for BSc/MSci Computer Science
(b) Optional for BSc Management and Information Technology (run jointly between Management School & SCC)
(c) Compulsory for BSc Software Engineering
(d) Compulsory for BSc IT for Creative Industries
- 40% Exam
- 60% Coursework
Assessment: Details of Assessment
The majority of assessment will be through written submissions as well as exams based assessment and moderated via the usual sampling methods, which will be provided by Computing (along with QA feedback).
60% Practical skills [two written assessments requiring simple programming and English writing skills]
This will focus on practical scenario based exercises where students will be required to apply reasoning skills along with the knowledged gained. The work will be assessed through formally written submissions or presentations as appropriate to the key subject areas.
The exam will test the students' problem solving abilities as well as knowledge of the taught materials and the learning outcomes as described.
Educational Aims: Subject Specific: Knowledge, Understanding and Skills
- This module focuses on the ways in which an IT professional can make effective decisions when securing an IT infrastructure. The module covers the tools, frameworks and models that can be used to identify Assets, Threats and Risks and then select appropriate strategies to manage the exposure that IT infrastructure faces in light of this analysis. This will be built upon an understanding of the mechanisms by which IT infrastructures are attacked. This module will also cover the principles of the technologies that may be used to mitigate the risks that are highlighted during the analysis process.
Educational Aims: General: Knowledge, Understanding and Skills
The module will teach general research and problem solving skills. It also aims to teach students how to place theoretical aspects of the design of secure systems.
Learning Outcomes: Subject Specific: Knowledge, Understanding and Skills
- On successful completion of this technical module students will:
- Have an understanding of the main concepts of threat management within the context of information security.
- Be aware and be able to apply appropriate threat and vulnerability assessment frameworks.
- Be able to apply appropriate controls to mange risk conmensurate with the level of risk exposure.
- Be apprised of the methodologies used to compromise an IT infrastructure.
Learning Outcomes: General: Knowledge, Understanding and Skills
- On successful completion of this module students will be able to
- Reason critically.
- Apply relevant theoretical concepts.
- Identify and solve problems, both individually and working in groups and formulate appropriate methods for troubleshooting.
- Demonstrate and exercise independence of mind and thought.
- Evaluate research and different types of information & evidence arguments critically.
- Synthesise and select appropriate information from a number of sources.
- Structure and communicate ideas effectively in writing.
- Plan, undertake and report on an individual piece of research-based work demonstratng appropriate hands-on skills.
If you encounter any difficulties accessing Online Courses Handbook information please contact the Student Registry:
If you require further details in relation to academic content please contact the appropriate academic department directly.