Short Title:Information Security - Vulnerabilities and Defences
Full Title:Information Security - Vulnerabilities and Defences
Module Code:NETW H6002
Credits: 10
Field of Study:Computing
Module Delivered in 4 programme(s)
Module Author:ENDA LEE
Module Description:This module addresses the issues involved in securing information in applications, storage, and during transmission in a network.
Learning Outcomes
On successful completion of this module the learner will be able to:
LO1 Critically evaluate modern cryptography and related techniques
LO2 Evaluate a network system with respect to its vulnerability to security attacks.
LO3 Assess and prevent attacks which result from insecure software development
LO4 Develop a security policy which enhances security awareness program within an organisation
LO5 Evaluate and prevent common vulnerabilities in web applications
LO6 Critically evaluate security features and mechanisms in operating systems

Module Content & Assessment

Course Work
Assessment Type Assessment Description Outcome addressed % of total Assessment Date
Continuous Assessment CA1 - Typical task: Research best practice for securing a web application 2,3 25.00 Week 4
Continuous Assessment CA2 - Typical task: Conduct a lab experiment to investigate a protocol or application vulnerability. Test and recommend solutions. 5,6 25.00 Week 8
End of Module Formal Examination
Assessment Type Assessment Description Outcome addressed % of total Assessment Date
Formal Exam End-of-Semester Final Examination 1,2,3,4,5,6 50.00 End-of-Semester

TU Dublin – Tallaght Campus reserves the right to alter the nature and timings of assessment


Module Workload

Workload: Full Time
Workload Type Workload Description Hours Frequency Average Weekly Learner Workload
Lecture Lecture 2.00 Every Week 2.00
Lab Lab 1.00 Every Week 1.00
Total Weekly Learner Workload 3.00
Total Weekly Contact Hours 3.00
This module has no Part Time workload.

Module Resources

Recommended Book Resources
  • Ali Dehghantanha,Mauro Conti,Tooska Dargahi 2018, Cyber Threat Intelligence, Springer [ISBN: 3319739506]
  • Lee Brotherston,Amanda Berlin 2017, Defensive Security Handbook: Best Practices for Securing Infrastructure, 1 Ed., O'Reilly [ISBN: 1491960388]
  • Lee Reiber 2018, Mobile Forensic Investigations: A Guide to Evidence Collection, Analysis, and Presentation, Second Edition, McGraw-Hill Education [ISBN: 1260135098]
  • Zeal Vora 2017, Enterprise Cloud Security and Governance, Packt Publishing [ISBN: 1788299558]
  • P. Karthikeyan,M. Thangavel 2018, Applications of Security, Mobile, Analytic and Cloud (SMAC) Technologies for Effective Information Processing and Management, Engineering Science Reference [ISBN: 152254044X]
This module does not have any article/paper resources
Other Resources

Module Delivered in

Programme Code Programme Semester Delivery
TA_KDMCO_M M. Sc. in Distributed and Mobile Computing 1 Mandatory
TA_KITMG_M M.Sc. in Information Technology Management 1 Mandatory
TA_KDMCO_PD Postgraduate Diploma in Distributed and Mobile Computing 1 Mandatory
TA_KITMG_PD Postgraduate Diploma in Information Technology Management 1 Elective