Layout print header[D]

MSc Information Systems Security

Full-time, Part-time

Location • City Campus
Subject area • Computing


By adding to My Courses you can compare courses and create a personalised prospectus.

We developed this course along two main lines.

The first covers the principles and issues of security design concerning systems and systems integration, web and non web-based applications and communication networks.

The second addresses the methodologies and development of skills required to perform security assessments of complex information systems.

Semester one modules

Information security concepts and principles
In this module we introduce the idea of risk management and the basic security properties (confidentiality, integrity, availability), security mechanisms (authentication and access control), security principles such as 'least privilege' and 'failsafe defaults' and security legislation. We spend time looking at cryptosystems and protocols; symmetric and asymmetric algorithms, digests, message authentication codes, digital signatures and Public Key Infrastructure (PKI). We look in detail at authentication mechanisms and protocols and a variety of access control types and implementations.

Assessment is via two online sets of challenges where you are presented with a series of problems to solve. The first of these involves general crytography and the second concerns PKI. A short online exam completes the assessment. Previous students have reported that they find the challenges an interesting and enjoyable way to expand their knowledge and understanding of the subject. You are supported by weekly lectures and lab sessions where hands-on exercises enable you to put the theory into practice to consolidate your learning.

Network security
You are initially introduced to the underlying technologies and protocols which allow networks to function. You then build on this information by learning how these technologies and protocols can be used to either secure or break into a network. Typical topics include • the principles of securing computer networks • firewall architecture and design • virtual private networks • network intrusion detection • vulnerability scanning.

Systems and application security
We consider security threats against the operating system and a number of commonly-used servers, such as Domain Name System (DNS), Email and Web. For example we look at issues relating to email spoofing in the Sendmail application and how a poorly-configured email server, either deliberately or accidently, can allow emails to be sent to users from trusted addresses. Another example of an area we look at is the Linux file system and how when properly secured, it can be used to prevent or delay an attacker compromising the entire system.

Web applications and e-commerce security
We aim to educate you on the potential insecurities that may be present in web applications throughout the world. We take you through the steps and processes required to carry out a penetration test on a web application to discover weaknesses in its configuration and setup. For example part of the module looks at cross-site scripting (XSS) and SQL injection, two very common and potentially dangerous vulnerabilities that have had their fair share of media attention. We also investigate ways to secure vulnerable web applications using techniques and tools such as web-based firewalls, access control and secure encryption.

Semester two modules

BSI ISO27001 lead auditor
Modern organisations have to constantly protect their assets and information against threats. These threats come in a variety of forms such as external hackers and internal users with grudges, script kiddies and organised crime syndicates. There are vast number of controls which can be put in place to help secure an organisation against these threats. Unfortunately, over time, these controls can become disjointed and unfit for purpose as the organisation grows or changes. This module teaches you how to approach the issue of information security management. You learn how to examine risks to organisations in depth, how to select a suite of information security controls and adopt and manage the process to ensure the information security management system works.

Group-based practical case study
You are given the opportunity to put into practice what you have learned in the preceding modules. In a team of six, you are given the specification for a computer system providing a number of services typical to a small organisation. Half of the team designs and builds a secure implementation of the specification and the other half develops a security evaluation strategy for the system. The emphasis is on following accepted standards, methodologies and systematic procedures in the development process. At the end of the module those developing the security evaluation system apply their strategy to another team's system in a day-long practical pen-testing session. All procedures are conducted in safe virtual environments built in our well-equipped labs. Tutors act as clients and consultants in the development processes and you also receive guidance from visiting expert security consultants. This is a highly demanding but extremely rewarding and valuable experience in the development of your security knowledge, awareness and skills.

Option modules
You study a selection from • information security management • computer forensics and incident response • intrusion detection in depth • incident handling and hacking techniques • assessing and securing wireless networks • consultancy theory and practice • an option module from other computing master degree

Semester three

You study research methods and do a substantial research project leading to a dissertation.

Find out more about studying MSc Information Systems Security

 

Attendance

Full-time –12 to 18 months
Part-time – typically two years
Starts September

How to apply

Complete the application form available at www.shu.ac.uk/study/form

Fees – home and EU students

2013/14 academic year

Typically £5,355 for the course
Part-time study should be calculated pro rata.

The course fee may be subject to annual inflationary increase. For further information on fees and funding see www.shu.ac.uk/funding

Fees – international students

2013/14 academic year

Typically £12,060 for the course

2014/15 academic year

Typically £12,150 for the course

The course fee may be subject to annual inflationary increase. For further information on fees, scholarships and bursaries see www.shu.ac.uk/international/fees

Assessment

Group and individual coursework. You also so a range of • problem solving assignments • workshops • practical projects • research activities.

Course enquiries

Click on the button below to enquire about this course.

Make your enquiry

Bookmark or share this page

| More

Sheffield Hallam University, City Campus, Howard Street, Sheffield S1 1WB, UK

Phone +44 (0)114 225 5555 | Fax +44 (0)114 225 4449

How we use cookies

Privacy policy

Freedom of information

Accessibility

Sitemap

Legal information