Page 9

Full-time Master's Priogramme 2015-16

MSc Cyber Security and Management (CSM) “ Core Modules Security Architectures and Network Defence The first Cyber Security module begins by introducing the domain and the course fundamental concepts relating to cyber security. Students will gain a comprehensive understanding of the underlying security infrastructure and in particular the protocols required in setting up a system where secure transactions (financial or communicational) are required. The syllabus explores a number of fundamental issues such as malware, attacks, the threat ecosystem, phishing, pharming and data theft, as well as some advances network defence systems and protocols relating to firewalls and intrusion detection systems. Cryptosystems and Data Protection This module focuses on the technology and concepts behind data protection and in particular the numerous cryptosystems and protocols that allow us to keep communications private. We also focus on the use of encryption technology to provide authorisation and access control systems. Throughout the module we disentangle often complex protocols to begin to understand how they work. The module will enable you to develop a broad understanding of data-centric protection, data-leakage threats and vulnerabilities and key prevention and detection technologies. Information Risk Management and Governance This module will develop your ability to establish and maintain an information risk management framework in order to guarantee that security and assurance strategies are aligned with business objectives and are consistent with legal and regulatory obligations. A strong focus will be put on business continuity and resilience - there is an emphasis on the practical nature of this process and the issues facing managers. Industrial Espionage and Counterfeiting This module examines the motivations for industrial espionage and the various methods of attack on the physical security of an organisation, its electronic infrastructures, and its staff and suppliers. Students will learn to analyse and mitigate potential attacks through industrial “ espionage; will develop an understanding of counterfeiting attacks and design countermeasures; and will carry out risk management processes in both industrial espionage and counterfeiting. Digital Forensics, Evidence and Intelligence Cyber-Crime affects all walks of life and transcends personal, social and business domains. This module investigates the Course techniques currently used for the purpose of data retrieval, evidence preparation, crime scene management and intelligence extraction where the source of the data is a digital storage system, a network system or any other connected system. It will give an overview of national and international digital forensic investigation infrastructures and put legal procedures into context. During the module you will look at real case studies and conduct a digital investigation on a complex investigative scenario. Plus three out of the following management modules: ▪ Globalisation and Outsourcing ▪ Financial Analysis and Control Systems ▪ Leadership ▪ Organisations, People and Performance go.warwick.ac.uk/wmgmasters/courses/csm 9 One reason I chose to study at WMG is because the course combines key cyber security technical concepts with management subjects including leadership and financial analysis. Through this, I felt I would be able to build the broad range of skills that today’s employers are looking for. During my studies I had the opportunity to present and publish a research paper entitled “Cyber Security of a Wireless Vehicle” at the Kaspersky Academy – Cyber Security for the Next Generation Conference (European Round). One of the best conferences in the world! Sabarathinam Chockalingam, India. CSM Graduate 2012-13 Security Researcher for an independent innovation and technology company “


Full-time Master's Priogramme 2015-16
To see the actual publication please follow the link above