|Assessment Type||Assessment length / details||Proportion|
|Semester Assessment||Online Assessment (10 hours)||50%|
|Semester Assessment||Assignment 4,000 word report on security issues (50 hours)||50%|
|Supplementary Assessment||Assignment 4,000 word report on security issues (50 hours)||50%|
|Supplementary Assessment||Online Assessment (10 hours)||50%|
On successful completion of this module students should be able to:
1. Design and structure databases appropriate to given problems, identifying potential issues of data persistence, resilience, security and verification of systems that process the data.
2. Evaluate the legal,social,ethical and professional issues involved in handling data.
3. Identify potential security issues with specific types of computer systems and the data they contain, and suggest mitigating strategies.
Many of the issues with the storing and handling of data are process-based. The data is not represented or stored appropriately, or ad hoc processes are used to produce results, or insufficient thought is put into how the data is made available or to whom. The module will look at a range of issues related to performance and security in the context of computer systems. It will address not only confidentiality and privacy of data but also the integrity of data and techniques for guaranteeing reproducible results.
This module gives students a technical understanding of the computing issues relevant to data modelling, management and security. It forms a firm foundation for later modules on practical issues in information security and in data mining (MSc Data Science).
2. Social, legal and professional issues with data and software. People in the system. Business drivers for software systems. Overview of relevant computer law. Quality Assurance and software engineering. Ideas of security, resilience, testing, maintenance.
3. Relational modelling and data storage. Persistent storage. Entities and relationships. Primary and foreign keys. Referential integrity. Relational algebra. Data normalisation. Overview of SQL. Validating a design.
4. Application Security issues: ORM, Database security, Big Data security, identity management, programming issues. Physical security.
5. Cryptography and system security: Cipher and algorithm types; applications to confidentiality, integrity and authentication; Key management; Digital Signatures. Authentication (secrets, tokens, biometrics); Access Control and Privilege management.
|Skills Type||Skills details|
|Application of Number||Inherent to subject|
|Improving own Learning and Performance||Inherent to subject|
|Information Technology||Inherent to subject|
|Personal Development and Career planning||Encourages students to see roles in subject for career and personal development|
|Problem solving||Inherent to subject|
|Research skills||Inherent to subject|
|Subject Specific Skills||Technical skills related to internet systems and security|
This module is at CQFW Level 7