Skip to main content

DISCONTINUED: SADP

SADP has been discontinued under this title and renamed. It is not being run under this name on any WMG programme.

Introduction

This module aims to equip students with the fundamental knowledge required relating to the underlying security
infrastructure and in particular the protocols which are required to set up a secure cyber-security system particularly one where secure transactions (financial or communicational) are required.
 

Objectives

  • Know and comprehensively understand and apply the key principles and philosophies which underlie the design of security architectures to develop a security architecture.
  • Know and comprehensively understand the principles which underlie data-centric protection, the development of data classification schemes, and the development of a strategic approach to data protection within an enterprise.
  • Develop a critical knowledge of the theoretical underpinnings of data-encryption techniques, their weaknesses and criteria that affect their suitability of for various potential applications.
  • Understand the role that security architectures and data protection can play within an enterprise information risk-management strategy, and their interaction with governance principles.
  • Learn to critique and know the limitations of typical approaches to security architectures and data protection.
  • Understand the business case underlying investment in security architectures and data protection techniques.

Indicative Syllabus

  1. The security Landscape
  2. Security Architectures and the CIA of Security
  3. Malware and Attacks, Typical Threats to Data
  4. The Threat EcoSystem, engineering Malware spread
  5. Phishing and Pharming and data theft. Understanding the various components of phishing and the technologies and techniques used to commit a social engineering attack
  6. The AAA of security
  7. Firewalls and Network Defence. Traditional perimeter protection. Understand the functions and limitations of the three different types of firewall (Packet Inspection, Stateful and Application/Proxy). Implementing security zones and topologies to implement network-based security. Layered approaches to security
  8. Intrusion Detection Systems. The components of an IDS and the functions of each component. Signatures in IDS. Host and network based intrusion detection systems.
  9. Understanding Logs from Firewalls, Intrusion Detection Systems and Web systems

Harj

Module Leader: Harjinder Singh Lallie.