Course Description

IT security is one of the key concerns of organisations today. Protection of company data, either on networked systems within the company or whilst in transit over the internet has become a priority. The aim of the module is to provide a practical guide to computer security issues. It looks at the threats faced by organisations. Cryptography and authentication issues are covered. Problems with securing the perimeter, securing the network, securing applications and securing data are all investigated. Ethical issues concerning data protection and hacking will be explored. Strategies for disaster recovery are examined.

Learning Outcomes

  1. have an understanding of the algoriths used in cryptography and be able to perform implementations of selected algorithms in this area
  2. appraise some of the problems concerned with securing the perimeter, securing the network, securing applications and securing data
  3. be able to make informed choices of the appropriate security measures to put in placefor a given network and/or operating system
  4. examine and appraise IT security policies
  5. evaluate data security in the light of ethical and legal frameworks, and know the constraints place on the 'ethical hacker'.