Please note

This document only provides information for the academic year selected and does not form part of the student contract

School:

School of Computing and Engineering

Credit Rating:

15

Level (including FHEQ):

M (FHEQ Level 7)

Graded or Non Graded:

Graded

Version Valid From:

2022-09-01

Module Leader:

Soufiene Djahel

Version Number

2023.02

Learning Methods

Guided Independent Study
Practical Classes and Demonstrations
Lecture

Professional Body Requirements

Institution of Engineering and Technology

Synopsis

Upon successful completion of this module, you will have a systematic understanding of knowledge, and critical awareness of current cyber security challenges and how they are exploited through cybercrime. This includes gaining practical knowledge of how to perform and critically evaluate a crime scene from a digital perspective. You will … For more content click the Read More button below.

Learning Strategy

Lectures and practicals will be delivered and supported by unsupervised study.

Outline Syllabus

• Security weakness within digital systems. This will include aspects from the end-user’s perceptivity, for example Confidentiality, Integrity, and Availability (CIA) Model.• Cybercrime and the most prominent attacks, including technical aspects of how they occur, as well as how they can be detected and prevented against. • Legal and ethical … For more content click the Read More button below.

Learning Outcomes

On successful completion of this module students will
1.
Formulate a systematic understanding of knowledge, and critical awareness of current cyber security challenges and how they are exploited through cybercrime.
2.
Demonstrate originality in the application of practical knowledge and critical evaluation of crime scene from a digital perspective.
3.
Critically evaluate and engage in scholarship in the discipline, including proposing and testing both research and investigative hypotheses.
4.
Deal with complex issues and make sound judgment in the absence of complete data, such as assessing vulnerable/compromised security to determine security implications, including mitigation actions.
5.
Communicate conclusions and work to specialist and non-specialist audiences.
6.
Demonstrate self-direction and originality in tackling and solving problems, including autonomously planning and implementing tasks at a professional level.

Formative Assessment

Assessment 1: Quizzes / polls
Assessment 2: Written draft
Assessment 3: Focused classwork observations

Summative Assessment

Assessment 1: Practical Skills Assessment
Assessment 2: Portfolio

Assessment Criteria

Assessment for both Task 1 and Task 2 will be based on norm-referenced criteria.

My Reading

Reading List