COMP08180 2021 Computer Security and Cryptography

General Details

Full Title
Computer Security and Cryptography
Transcript Title
Computer Security and Cryptogr
N/A %
Subject Area
COMP - Computing
BUS - Business
08 - NFQ Level 8
05 - 05 Credits
Start Term
2021 - Full Academic Year 2021-22
End Term
9999 - The End of Time
Veronica Rogers
Programme Membership
SG_MBUSI_H08 202100 Bachelor of Arts (Honours) in Business and ICT

Learners will examine Cyber Security in relation to a business environment, in particular the module will explore specific attacks, attackers motives and threat modelling in a business environment.  The learner will critically evaluate the challenges in relation to cyber security and the consequences of a data breach for an organisation.  The learner will explore and evaluate different cryptographic systems and how they differ from each other.

Learning Outcomes

On completion of this module the learner will/should be able to;


Evaluate and explore the term Cyber Security and its relevance in a business environment


Analyse security issues, analyse ways businesses can mitigate against security issues and illustrate consequences of security breaches for an organisation


Examine the components of a cryptosystem and analyse different cryptographic attacks


Examine and analyse the principles of Cryptography

Teaching and Learning Strategies

Lectures will be used to present the material throughout the module and laboratory exercises will be used to reinforce the learning experience.

Module Assessment Strategies

Students will be accessed through the application of techniques using case studies/practical elements which will require application of content covered.  Understanding of theoretical concepts will be assessed via an end of module examination.

Repeat Assessments

Repeat failed elements

Indicative Syllabus

1.  Evaluate and explore the term Cyber Security and its' relevance in a business environment

  • Introduction to Cyber Security
  • Introduction to terminology/types of actors - Hackers, crackers, cyber criminals etc..
  • Security threats and attacks
  • Threat modelling and risk assessments
  • Security standards
  • Ethics in Cyber Security

2.  Analyse security issues, analyse ways businesses can mitigate against security issues and illustrate consequences of security breaches for an organisation

  • Types of security issues to affect businesses (Malware, viruses, rootkits, RATs, Spyware, adware, phishing, social engineering, darknet, Ransomware etc..)
  • Authentication in systems
  • CIA triage
  • Mitigating strategies for businesses
  • Best practices in relation to security
  • Risk management (separation of duties, job rotation, acceptable use policy, security policies, secure coding etc..)
  • Consequences of a data breach for organisations
  • Incident detection and response

3.  Examine the components of a cryptosystem and analyse different cryptographic attacks

  • Evolution of cryptography systems
  • Fundamentals of cryptographic systems
  • Terminology (Hashing, salt, IV, nonce etc..)
  • Basic model of a cryptosystem
  • Types of cryptographic attacks (Birthday attacks, known plain text/cipher text, rainbow tables, dictionary attacks, brute force, collision, replay etc..)

4.  Examine and analyse the principles of Cryptography

  • Block & stream ciphers
  • Symmetric algorithms
  • Asymmetric algorithms
  • Public key cryptography
  • Steganography
  • Obfuscation

Coursework & Assessment Breakdown

Coursework & Continuous Assessment
50 %
End of Semester / Year Formal Exam
50 %

Coursework Assessment

Title Type Form Percent Week Learning Outcomes Assessed
1 Practical Assessment Continuous Assessment Closed Book Exam 25 % Week 6 2
2 Practical Assessment Continuous Assessment Closed Book Exam 25 % Week 10 4

End of Semester / Year Assessment

Title Type Form Percent Week Learning Outcomes Assessed
1 Final Written Exam Final Exam Closed Book Exam 50 % Week 12 1,2,3,4

Full Time Mode Workload

Type Location Description Hours Frequency Avg Workload
Lecture Online Lecture 1 Weekly 1.00
Laboratory Practical Computer Laboratory Practical 2 Weekly 2.00
Independent Learning Not Specified Independent Learning 4 Weekly 4.00
Total Full Time Average Weekly Learner Contact Time 3.00 Hours

Required & Recommended Book List

Required Reading
2019-01-29 The Secret to Cybersecurity Forefront Books
ISBN 1948677083 ISBN-13 9781948677080

Cyber crimes are a threat and as dangerous as an armed intruderyet millions of Americans are complacent, unknowing, or simply ignorant of how to protect themselves. The Secret to Cybersecurity closes that knowledge gap by using real-life examples to educate readers how to protect themselves in very simple ways. Its 2 you know who your child is online with? According to author Scott Augenbaum, between 80 to 90 percent of students say they do whatever they want on their smartphonesand their parents dont have a clue. Is that you? What about your online banking passwords, are they safe? Your weaknesses are not always what you think they are. There are bad people in the world, and they are on the internet. They want to hurt you. They are based all over the world, so theyre hard at work when even youre sleeping. They use automated programs to probe for weaknesses in your internet security programs. And they never stop. Cyber crimes is on the increase internationally, and its up to you to protect yourself. But how? The Secret to Cybersecurity is the simple and straightforward plan to keep you and your family safe. Written by Scott Augenbaum, a 30-year veteran of the FBI who specialized in cyber crimes, it uses real-life examples to educate and inform readers, explaining who/why/how so youll have a specific takeaway to put into action for your family. Learn about the scams, methods, and ways that cyber criminals operateand learn how to fight back.

Required Reading
2004-01-30 Cryptography For Dummies For Dummies
ISBN 0764541889 ISBN-13 9780764541889

Cryptography is the most effective way to achieve data security and is essential to e-commerce activities such as online shopping, stock trading, and banking This invaluable introduction to the basics of encryption covers everything from the terminology used in the field to specific technologies to the pros and cons of different implementations Discusses specific technologies that incorporate cryptography in their design, such as authentication methods, wireless encryption, e-commerce, and smart cards Based entirely on real-world issues and situations, the material provides instructions for already available technologies that readers can put to work immediately Expert author Chey Cobb is retired from the NRO, where she held a Top Secret security clearance, instructed employees of the CIA and NSA on computer security and helped develop the computer security policies used by all U.S. intelligence agencies

Module Resources