In the move to our new system and website, we are encountering some technical issues.
We are working hard to fix these and we appreciate your patience and understanding.

Subject details

  • Topics
    • A week-by-week guide to the topics you will explore in this subject will be provided in your study materials.
  • Study resources
    • Online Materials
      • Resources and Links

Upon fulfilling the requirements of this subject, students will have the skills and knowledge to:

  1. Demonstrate a comprehensive understanding of the key crime types and criminological issues which relate to cybercrime.
  2. Critique and evaluate key security vulnerabilities of data storage infrastructure.
  3.  Demonstrate a comprehensive understanding of threats to computer networks and physical infrastructure.
  4. Demonstrate a comprehensive understanding of the key procedures and practices relevant to the management of cyber security risks and countermeasures.
  5. Integrate and analyse relevant theoretical and case-based literature to present a sustained, coherent and logical consideration to cybercrime and cyber security
  • Assignment 1 - Assessment 1 (10%)
  • Assignment 2 - Assessment 2 (15%)
  • Assignment 3 - Assessment 3 (25%)
  • Assignment 4 - Assessment 4 (50%)

Textbooks are subject to change within the academic year. Students are advised to purchase their books no earlier than one to two months before the start of a subject

Entry Requirements

You must have successfully completed the following subject(s) before starting this subject:

Special requirements

No special requirements

Computer systems and networks, and the applications that they support, are essential to information flows, economic transactions and critical infrastructure in the twenty-first century. This subject will present an overview of cyber security in practice with reference to both public and private sector organisations. The subject will look at the motives and perpetrators of cybercrime. It will explore how individuals and organisations face specific threats from their use of technology and identifies challenges in maintaining cyber and information security. It further examines the protective security measures required to protect physical and digital access to information through people, infrastructure and computer systems. The subject complements PICX111 which looks at non-traditional security threats in the twenty-first century.

Related degrees