Information Security - 2025 entry
| MODULE TITLE | Information Security | CREDIT VALUE | 15 |
|---|---|---|---|
| MODULE CODE | ECMM442 | MODULE CONVENER | Unknown |
| DURATION: TERM | 1 | 2 | 3 |
|---|---|---|---|
| DURATION: WEEKS |
| Number of Students Taking Module (anticipated) | 20 |
|---|
On successful completion of this module you should be able to:
Module Specific Skills and Knowledge:
-
Discuss the main concepts of information security.
-
Discuss the most common kinds of malicious activity relating to data and online transactions.
-
Demonstrate knowledge of techniques and methods for ensuring security in digital information systems.
-
Understand the role of information security in online commercial, financial and other activities.
-
Use appropriate techniques to improve security of digital information.
-
Communicate ideas, techniques and results fluently using written means appropriate for the intended audience.
-
Communicate using notebooks and other digital media appropriate for a specialist audience.
- Malicious behaviours: hacking, malware, data theft, denial-of-service, online fraud
- Secure storage
- Data encryption and secure communication
- Cybersecurity, network security and online privacy
- Access control mechanisms
- Firewalls and Intrusion detection
- Malicious software and software security
- Authentication and digital signatures
- Blockchain and distributed ledgers
| Scheduled Learning & Teaching Activities | 34 | Guided Independent Study | 116 | Placement / Study Abroad | 0 |
|---|
|
Category |
Hours of study time |
Description |
|
Scheduled Learning and Teaching activities |
16 |
Lectures |
|
Scheduled Learning and Teaching activities |
18 |
Practical Work |
|
Guided independent study |
50 |
Project Work |
|
Guided independent study |
66 |
Background Reading and Self-Study |
|
Form of Assessment |
Size of Assessment (e.g. duration/length) |
ILOs Assessed |
Feedback Method |
|---|---|---|---|
|
Practical Exercises |
18 hours |
1-7 |
Oral |
| Coursework | 70 | Written Exams | 0 | Practical Exams | 30 |
|---|
|
Form of Assessment |
% of Credit |
Size of Assessment (e.g. duration/length) |
ILOs Assessed |
Feedback Method |
|---|---|---|---|---|
|
Coursework (practical work and report) |
80 |
Code notebook and 2000 word report |
1-7 |
Written |
|
Assessed practical |
20 |
1 hour |
1-7 |
Written |
|
Original Form of Assessment |
Form of Re-assessment |
ILOs Re-assessed |
Time Scale for Re-assessment |
|---|---|---|---|
|
Coursework (practical work and report) |
Code notebook and 2000 words |
1-7 |
Referral/deferral period |
|
Assessed practical |
Assessed practical (1 hour, 30%) |
1-7 |
Referral/deferral period |
Deferral – if you miss an assessment for certificated reasons judged acceptable by the Mitigation Committee, you will normally be either deferred in the assessment or an extension may be granted. The mark given for a re-assessment taken as a result of deferral will not be capped and will be treated as it would be if it were your first attempt at the assessment.
Referral – if you have failed the module overall (i.e. a final overall module mark of less than 50%) you will be required to re-take some or all parts of the assessment, as decided by the Module Convenor. The final mark given for a module where re-assessment was taken as a result of referral will be capped at 50%.
information that you are expected to consult. Further guidance will be provided by the Module Convener
Reading list for this module:
| Type | Author | Title | Edition | Publisher | Year | ISBN |
|---|---|---|---|---|---|---|
| Set | Pfleeger, C. P., Pfleeger, S. L., Margulies, J | Security in Computing | 5th | Prentice Hall | 2015 | 978-0-13-408504-3 |
| Set | John R. Vacca | Computer and Information Security Handbook | 2nd | 2013 | ||
| Set | William Stallings, Lawrie Brown | Computer Security: Principles and Practice | 3rd | 2014 |
| CREDIT VALUE | 15 | ECTS VALUE | 7.5 |
|---|---|---|---|
| PRE-REQUISITE MODULES | ECMM430 |
|---|---|
| CO-REQUISITE MODULES |
| NQF LEVEL (FHEQ) | 7 | AVAILABLE AS DISTANCE LEARNING | No |
|---|---|---|---|
| ORIGIN DATE | Tuesday 10th July 2018 | LAST REVISION DATE | Tuesday 6th May 2025 |
| KEY WORDS SEARCH | Information security, cybersecurity, online information |
|---|
Please note that all modules are subject to change, please get in touch if you have any questions about this module.


