System Security Project
Duration
- 1 Semester
Contact hours
- Equivalent to 96 hours
On-campus unit delivery combines face-to-face and digital learning.
Prerequisites
Concurrent pre-requisites
Aims and objectives
Aims
The key focus of system security unit is on enabling students to develop practical and working tactics to achieve digital security. In this unit, students will learn operational system security, the security of databases and servers and various aspects including design, implementation, and configuration in order to apply security measures and principles to protect these systems. Students will explore the framework of cyber security and safety principles and guidelines and the various tools used to enforce security and privacy. The unit will use a project-based learning paradigm to facilitate team-based investigations into cybersecurity events and threats. Students will perform guided exploitation attacks in practical sessions.
Objectives (Unit Learning Outcomes) (ULO)
Students who successfully complete this Unit will be able to:
1. Demonstrate a knowledge of the terminology, classifications, technologies and consequences of cybersecurity threats and attacks.
2. Recommend and plan a range of the security controls and mitigation strategies to protect on-line and stand-alone computer systems, their weaknesses, functionalities, architectures, and configuration.
3. Assess and apply commonly-used techniques and tools to subvert computer security systems, enabling unauthorised access to data, processes, workflows and computing capacity.
4. Evaluate current security practices and security system usability in terms of the facilitation of social engineering attacks.
5. Discuss appropriate research methods for testing and evaluating investigation procedures and responses to attacks, data breaches and security threats.
6. Discuss the findings of cybersecurity investigations with peers and communicate to appropriate audiences.
7. Verify the effectiveness of team-based environments to investigate security threats and challenges.
Objectives (Unit Learning Outcomes) (ULO)
Students who successfully complete this Unit will be able to:
1. Demonstrate a knowledge of the terminology, classifications, technologies and consequences of cybersecurity threats and attacks.
2. Recommend and plan a range of the security controls and mitigation strategies to protect on-line and stand-alone computer systems, their weaknesses, functionalities, architectures, and configuration.
3. Assess and apply commonly-used techniques and tools to subvert computer security systems, enabling unauthorised access to data, processes, workflows and computing capacity.
4. Evaluate current security practices and security system usability in terms of the facilitation of social engineering attacks.
5. Discuss appropriate research methods for testing and evaluating investigation procedures and responses to attacks, data breaches and security threats.
6. Discuss the findings of cybersecurity investigations with peers and communicate to appropriate audiences.
7. Verify the effectiveness of team-based environments to investigate security threats and challenges.
Unit information in detail
- Teaching methods, assessment, general skills outcomes and content.
Teaching methods
*Scheduled face to face: Lectures (24 hours), Tutorials in Computer Labs (72 hours)
*Scheduled synchronous online learning events: N/A
Non-scheduled online learning events and activities: N/A
Other non-scheduled learning events and activities: Independent study and assessment tasks (approx.200 hours)
*Scheduled synchronous online learning events: N/A
Non-scheduled online learning events and activities: N/A
Other non-scheduled learning events and activities: Independent study and assessment tasks (approx.200 hours)
Assessment
Types | Individual or Group task | Weighting | Assesses attainment of these ULOs |
Portfolio | Individual | 75% | 1,2,3,4,5,6,7 |
Research Methods Review | Individual | 25% | 5,6 |
Minimum requirements to pass this Unit
As the minimum requirements of assessment to pass a unit and meet all Unit Learning Outcomes to a minimum standard, a student must achieve:
(i) an aggregate mark of 50% or more
(ii) 40% or more for each assessment.
As the minimum requirements of assessment to pass a unit and meet all Unit Learning Outcomes to a minimum standard, a student must achieve:
(i) an aggregate mark of 50% or more
(ii) 40% or more for each assessment.
General skills outcomes
During this unit students will receive feedback on the following key generic skills:
- problem solving skills
- analysis skills
- ability to tackle unfamiliar problems
- ability to work independently, and
- ability to work in teams.
- problem solving skills
- analysis skills
- ability to tackle unfamiliar problems
- ability to work independently, and
- ability to work in teams.
Content
• Cybersecurity taxonomy:
o Classes of attacks/vulnerabilities
o Consequences of attacks/vulnerabilities
o Technologies of attacks/vulnerabilities
• Modern System Security concepts, strategies, and techniques
• SSL/TLS attacks
• Script injection attacks
• Usability, misdirection, social engineering and "FUD"
• Taster (guided) cybersecurity project
• The "What, Where, Prove/Mitigate/Fix" approach to cybersecurity incident response
• Cyber Threat Intelligence and Cyber Threat Hunting (Kaspersky curriculum):
o Security operations centre,
o modern attack tactics, techniques, and procedures
o SOC operations
o attack detection and investigation
• Constrained cybersecurity project.
o Classes of attacks/vulnerabilities
o Consequences of attacks/vulnerabilities
o Technologies of attacks/vulnerabilities
• Modern System Security concepts, strategies, and techniques
• SSL/TLS attacks
• Script injection attacks
• Usability, misdirection, social engineering and "FUD"
• Taster (guided) cybersecurity project
• The "What, Where, Prove/Mitigate/Fix" approach to cybersecurity incident response
• Cyber Threat Intelligence and Cyber Threat Hunting (Kaspersky curriculum):
o Security operations centre,
o modern attack tactics, techniques, and procedures
o SOC operations
o attack detection and investigation
• Constrained cybersecurity project.
Study resources
- Reading materials.
Reading materials
A list of reading materials and/or required texts will be made available in the Unit Online.