This unit investigates the cyber-security threat landscape organisations face in terms of common attack types, the roles of different threat actors, and the consequences for the victims of a successful cyber-attack. Investigate how conventional risk management techniques might be applied to identifying, documenting, and prioritising cyber-security risks, focusing on the vulnerabilities of web protocols, browsers, HTTP/HTTPS, SSL/TLS, and application layers of the network infrastructure. This also involves the identification of relevant security controls—firewalls, intrusion detection systems, and encryption to mitigate these risks, together with strategic planning based on priorities identified within the organisation.
On successful completion of this unit, students will be able to:
This unit is studied as part of the following course(s):