![]() This includes number systems (natural, negative and real numbers), prime, relatively prime and co-prime numbers. It would be helpful to have a basic understanding of some mathematical principles for the cryptography block. If you’re not sure you’re ready, talk to an advisor. Please see the IELTS website for details. If English is not your first language, we recommend that you will need a minimum overall score of 6 and minimum score of 5.5 in each of the four components: reading, writing, speaking and listening under the International English Language Testing System (IELTS). Your spoken and written English must be of an adequate standard for postgraduate study. at least three years relevant industry experience.a bachelors degree (or equivalent) in computing or a related discipline.assess the effectiveness of different security solutions.implement appropriate security mechanisms to mitigate the threats posed in different systems contexts.evaluate the role of authentication, authorisation and audit mechanisms, cryptographic techniques, methods for securing distributed systems, and techniques securing operating systems and virtualisation technologies.analyse cyber security threats for different digital systems, using systematic methods. ![]() Types of distributed systems peer-to-peer (P2P) systems and associated security threats mechanisms to secure distributed systems. ![]() Security mechanisms for operating system functions virtualization technologies and associated security mechanisms designing secure operating systems and virtualized system architectures. Symmetric and asymmetric cryptography applications of cryptography.īlock 3 – Authentication, authorisation and accountability (AAA)Īuthentication protocols and technologies authorisation and access control models, enforcement mechanisms, federated access control principles of accountability including data collection, analysis, assessment and privacy.īlock 4 – Operating systems and virtualisation security Introduction to systems security modelling systems and analysing threats fundamentals of cryptography fundamentals of authentication, authorisation, accountability fundamentals of operating systems and virtualisation security fundamentals of distributed systems security. The emphasis being on the design and implementation of the appropriate cryptographic techniques to secure a systems architecture. The focus of this module is the application of cryptography – how, when, and why. You’ll be concerned with the mathematics involved in cryptography. This gives an overview of the other blocks and covers the introductory principles of those blocks. Block 1 introduces the domain of systems security. Did we do a good job? – assess whether the security of the system is effective.What are we going to do about it? – evaluate the methods to secure the system and implement them.What can go wrong? – analyse the threats relevant to the system.What are we doing? – describe the system we want to secure.For any given systems context, we systematically answer the following questions: To address the challenges of systems security, we adopt an approach inspired by Adam Shostack’s method for modelling security threats. Within the broader field of cyber security, these activities fall into the domain of systems security, which is the focus for this module. They need the knowledge and skills to analyse threats against the security of these systems, evaluate suitable solutions that minimise the risk of these threats being realised, and implement these solutions and monitor their efficacy. Securing digital systems requires qualified technical cyber security professionals. Systems range from those embedded in our homes – providing security, energy management and home automation capabilities – to desktop and mobile computing systems, and control systems powering the 4th industrial revolution. The proliferation of digital systems impacts our daily lives, bringing a range of challenges, including the security of these systems. ![]() Throughout the module, you’ll develop knowledge and understanding of these important cyber security subject areas. This knowledge area includes cryptography authentication, authorisation and accountability (AAA) operating systems and virtualisation security and distributed systems security. This module is based on the systems security domain of the Cyber Security Body of Knowledge (CyBOK). ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |