This is an introductory course to Information Security.
The course will introduce the fundamental concepts of information security, covering a variety of topics, including elements of cryptography, security protocols, computer and network security.
The course's approach to present this material is to focus on how to use cryptography to enable secure communications: we will see how to use and combine the several cryptographic tools to set up a channel that can be used to "securely" exchange data between two communicating parties.
Malicious software (malware) is the traditional way in which cybercriminals infect user and enterprise hosts to gain access to their private, financial, and intellectual property data. Once stolen, such information can enable more sophisticated attacks, generate illegal revenue, and allow for cyber-espionage.
By mixing a practical, hands-on approach with the theory and techniques behind the scene, the course discusses the current academic and underground research in the field, trying to answer the foremost question about malware and underground economy, namely, "Should we care?".
Students will learn how traditional and mobile malware work, how they are analyzed and detected, peering through the underground ecosystem that drives this profitable but illegal business. Understanding how malware operates is of paramount importance to form knowledgeable experts, teachers, researchers, and practitioners able to fight back. Besides, it allows us to gather intimate knowledge of the systems and the threats, which is a necessary step to successfully devise novel, effective, and practical mitigation techniques.
IY5501 is in two parts: the first part provides an introduction to information security management, and the second part is concerned with research methods.
IY4501 provides an introduction to security management, and shares lectures and all other teaching material with the corresponding part of IY5501.
In the security management part of IY5501 we will explain the need for effective security management and identify the problems associated with security management. We will explore how risks are analysed and how appropriate remedial actions are identified and implemented, referring to relevant standards and legal requirements.
The main goal of the research methods part of IY5501 is to provide students with the tools they need to complete an excellent MSc project. Topics covered include how to use the literature, an introduction to qualitative and quantitative research methods, and guidance on structuring and writing an MSc dissertation.
IY5501B provides an introduction to security management (and for those commencing their degrees from 2023, research methods). We will explain the need for effective security management and identify the problems associated with security management. We will explore how risks are analysed and how appropriate remedial actions are identified and implemented, referring to relevant standards and legal requirements.
The module is concerned with the protection of data transferred over digital networks, including computer and telecommunications networks. We review networking concepts, particularly the concepts of services and protocols, and study how services are incorporated in network communications by specifying protocols. We extend the discussion of services to address security concerns, considering how cryptographic primitives may be used to provide confidentiality, integrity and authentication services. We illustrate these concepts by considering a variety of case studies, typically including wireless, cellular, network and transport layer protocols, techniques and technologies, including non-cryptographic countermeasures such as packet-filtering, intrusion detection, etc.
Objectives
At the end of the module students should have gained an understanding of the fundamentals of the provision of security in networks, as well as an appreciation of some of the problems that arise in devising practical solutions to network security requirements.
IY5512 is one of the four compulsory modules on the Information Security MSc. The aims of the computer security module are to introduce the security issues that computer systems must address and to describe some of the techniques for implementing security in operating systems.
- define liability from cyber security failure,
- limit freedom of security operations, and
- explain multinational online liability.
The module is designed for a multinational student body and is not limited to the laws of any single jurisdiction. No prior study of law is necessary.
The course introduces principles of forensic science and sketches relevant aspects of general and UK legal and regulatory principles, but is not limited to digital forensics as used in courts of law since areas such as compliance monitoring and even the analysis of cyber security breaches also rely on these techniques and principles.
The module covers methods for the collection and analysis of digital evidence, highlighting limitations and fragility of evidence as well as susceptibility to malicious manipulation.
The module covers storage as well as network forensics techniques, host-based techniques for analysing memory and live system behaviour with an emphasis on Microsoft Windows and selected mobile platforms (Apple iOS and Google Android).
- Best practice in reporting and conducting security assessments and audits
- Security assessment and audit frameworks
- Practical skills in gathering and utilising OSINT to inform clients of their exposure to remote and local cyber threats
- Enumeration and confirmation of vulnerabilities in a variety of hosts (LAN and Web)
- Target Exploitation for the purpose of providing a methodological review of vulnerabilities and their consequences
- Theory regarding attacker-defender interactions, focusing on game-theoretic concepts
Students will interact with standards such as ISO27000 and NIST SP 800-115, as well as OWASP.
Student can expect a focus on ethics with regards to client confidentiality, legal issues facing security testers (indemnity and culpability in specific situations), and the principles of white-hat hacking.
Please bear in mind that this course focuses first and foremost on an ethical and methodological approach to exploitation, and that students are responsible for ensuring that they follow good practice, as defined in the course documentation (and elaborated on in Lecture 1).
For this, a number of models to study large-scale systems and networks are introduced, as well as models of adversaries and interactions with adversaries along with selected case studies of such advanced attacks and attack vectors.
The module also covers cyber-physical system security at lower levels with an overview particularly of control systems and SCADA architectures as well as threats and attacks against these.