Skip to main content Skip to navigation

Implementing Secure Systems

Learn to:
  • Critically analyse the relationship between human trust, and the technological tokens that represent trust, in cyber systems
  • Design a security architecture that satisfies the security needs of a given scenario, potentially spanning multiple platforms
  • Apply cryptographic techniques and configure systems to achieve desired security objectives
Why is this important?

Secure systems have a singular goal - to concurrently enable things to happen that should happen, whilst preventing things from happening that should not happen. Within that simplicity are deep challenges: defining the contextually contingent sets of should and should not; anticipating what the future might bring; determining the extent of the system.

Content

This module is concerned with deliberately choosing good patterns of implementation for the long-term well being of the system.

Module content will cover:

  • design and development considerations
  • selecting and applying core technologies
  • recognising security needs on, across and between platforms
  • cryptography
  • network security
  • human factors
  • security systems development

Delivery and assessment

10 half-day sessions will be regularly spaced across Year 2. Within each half day session, there will be a mix of lecture, tutorial and practical activity.

Assessment is 100% coursework for this module.

Essential information

Entry Requirements
A level: AAA (STEM subjects preferred)
IB: 36 points (STEM subjects preferred), with a minimum of 4 in English

UCAS Code
H651

Award
Degree of Bachelor of Science (BSc)

Duration
3 years full time (30 weeks per academic year)

Tuition fees
Find out more about fees and funding

How to apply Undergraduate admissions