COM771 Cyber Security, Level 7 Module Handbook 2024-25 | Ulster University

Published: 03 Mar, 2025
Category Assignment Subject Computer Science
University Ulster University Module Title COM771 Cyber Security

Aim and Learning Outcomes

Companies, governmental organisations, and individuals face ongoing challenges in the rapidly evolving field of cyber security. Businesses may incur significant costs as a result of cyber-attacks. A data breach can result in the loss of uncountable sums of money for the organisation as well as irreparable reputational damage. Nowadays, cyberattacks are getting more and more destructive. Cyberattacks are being launched by cybercriminals in more sophisticated ways. Organizations are being compelled to better protect the personal data they hold by regulations like the GDPR. Due to the aforementioned factors, cyber security has taken on a significant role in business, and right now the emphasis is on creating effective response plans that lessen the effects of a cyber-attack. However, a person or organisation can only create a suitable response strategy when they are well-versed in cyber security fundamentals.

This module provides a critical awareness of the new hardware and software components in cyber security and shows how they can be used in a variety of application domains. The module demonstrates an understanding of threats, viruses, malware, attacks, and the measures to address them. The module offers students the chance to develop an understanding of current cyber security challenges and has a strong practical component.

Overall Aim of the Module

This module aims to:

  • Allow students the opportunity to conduct a thorough investigation into the various technologies used in cyber security.
  • Acquire a critical understanding of the complex and emerging issues that surround the conception, creation, and assessment of cyber security solutions.
  • Develop a thorough understanding of research methodologies through self-direction and independent work, making sensible decisions and putting forth new hypotheses for the use of cyber security technologies.
  • The module will also foster an understanding of the social and ethical concerns raised by the use of cyber security concepts across a variety of domains.

Learning Outcomes

  1.  Develop an appreciation of commercial and open-source cyber security products, services, and software.
  2. Using a critical analysis of the literature, assemble and demonstrate a systematic understanding of the fundamental theories, concepts, and practices underlying the use of technology for cyber security.
  3. Acquire insight into the management and applications essential to understanding cyber security issues.
  4. Critically evaluate the legal, ethical, and social considerations (i.e., privacy, data access rights, and harmful actions) related to the design and implementation of cyber security solutions.

Coursework 1 Assessment Task

Introduction

This module serves as a foundation for developing an in-depth understanding of the changing hardware and software elements in the field of cyber security. The main objective of Coursework 1 is to offer a structured opportunity for students to assess and analyse state-of-the-art cyber security systems critically. This process entails an extensive investigation of the fundamental principles that support their functioning and a careful evaluation of their possible uses in new interdisciplinary fields.

The primary goals of Coursework 1 encompass:

  1. Evaluation of Cutting-Edge Cyber security Systems: You are tasked with critically appraising the latest advancements in cyber security, requiring a meticulous examination of their operational fundamentals.
  2.  Consideration of Future Applications: Beyond current applications, you are encouraged to explore and speculate on the potential future applications of these cyber security systems within a diverse range of multidisciplinary domains.
  3. Technical and Practical Challenges: An integral aspect of this coursework is the investigation of the technical intricacies inherent in cyber security solutions, coupled with a comprehensive analysis of the practical challenges associated with their implementation.

What is the topic?

For this assignment, you are required to investigate the application of cyber security in alleviating one of the Grand Societal challenges:

  • Cyber security in Healthcare Systems:
  • Investigate the role of cyber security measures in safeguarding electronic health records, medical devices, and healthcare infrastructure to ensure the privacy and security of patient information.
  • Securing Critical Infrastructure from Cyber Threats:
  • Explore strategies and technologies for protecting critical infrastructure sectors such as energy, water, transportation, and communication from cyber-attacks.

Cyber security in Financial Systems:

  • Examine the challenges and solutions for securing financial systems, online transactions, and digital banking platforms to prevent cyber threats and financial fraud.
  • Securing the Internet of Things (IoT) Devices:
  • Investigate how cyber security measures can be applied to address the vulnerabilities of IoT devices, ensuring the security and privacy of connected devices in homes, businesses, and industries.

Cyber security in Smart Cities:

  • Explore the implementation of cyber security measures in smart city initiatives to protect critical infrastructure, data, and services that contribute to the efficiency and sustainability of urban environments.

Cyber security and Autonomous Vehicles:

  • Examine the cyber security challenges associated with autonomous vehicles, including securing vehicle-to-everything (V2X) communication and ensuring the safety of connected and autonomous transportation systems.

Cyber security in Education Systems:

  • Explore the challenges and solutions for securing educational institutions, including protecting sensitive student data, ensuring the integrity of online learning platforms, and preventing cyber threats in academic environments.

Cyber security and Supply Chain Management:

  • Examine the importance of cyber security in securing the supply chain, addressing vulnerabilities in the procurement and distribution process to prevent cyber-attacks on businesses and critical supply chain components.

Securing Personal and Consumer Devices:

  • Investigate the role of cyber security in protecting personal devices, such as smartphones, laptops, and smart home devices, to ensure the privacy and security of individuals in the digital age.

For more topics visit the National Cyber Security Centre website.

You should carry out a thorough literature analysis to clearly outline how cyber security measures can improve the security of systems, ultimately leading to increased practicality and usefulness. The investigation should involve a comprehensive consideration of the technical, social, and ethical challenges faced by cyber security systems.

What is required?

You are required to present your findings in a short 2-page research paper. This paper will be accompanied by a 3-minute Video Abstract summarising your findings.

The paper should be written in IEEE Conference Proceedings format and be no more than 2 pages in length, including all references.

The Video abstract should be no longer than 3 minutes in length and ideally be in .mp4 format. Guidance on things to consider when creating a Video Abstract can be found here. Further guidance of hints and tips will be provided in class and lab sessions.

Any items exceeding the page/ time limits specified will have proportional marks deducted in line with Ulster University Guidelines.

Coursework 2 Assessment Task

Introduction

This module has a strong focus on the practical implementation of concepts and provides opportunities for you to improve your abilities in creating applications for data and communication security. Subsequently, these solutions can be methodically assessed by employing suitable evaluation frameworks throughout the development and implementation phases.

The objective of Assignment 2 is to offer you an opportunity to investigate, develop, and assess a cyber security solution. By utilising actual simulation software, you will apply your comprehension of theoretical principles acquired in this module and create a solution to a real-world problem. Students are required to possess self-motivation in order to acquire knowledge about the technologies and deliver a presentation to explain their findings.

What is the topic?

For this assignment, you are required to design and implement a security solution for security and privacy of the data and communications. The solution should aim to address a real-world problem cyber security challenge. A few example areas are listed below:

Cyber security in Healthcare Systems:

•    Investigate the role of cyber security measures in safeguarding electronic health records, medical devices, and healthcare infrastructure to ensure the privacy and security of patient information.

Securing Critical Infrastructure from Cyber Threats:

•    Explore strategies and technologies for protecting critical infrastructure sectors such as energy, water, transportation, and communication from cyber-attacks.

Cyber security in Financial Systems:

•    Examine the challenges and solutions for securing financial systems, online transactions, and digital banking platforms to prevent cyber threats and financial fraud.

Securing the Internet of Things (IoT) Devices:

•    Investigate how cyber security measures can be applied to address the vulnerabilities of IoT devices, ensuring the security and privacy of connected devices in homes, businesses, and industries.
 

Cyber security in Smart Cities:

•    Explore the implementation of cyber security measures in smart city initiatives to protect critical infrastructure, data, and services that contribute to the efficiency and sustainability of urban environments.

Cyber security and Autonomous Vehicles:

•    Examine the cyber security challenges associated with autonomous vehicles, including securing vehicle-to-everything (V2X) communication and ensuring the safety of connected and autonomous transportation systems.

Cyber security in Education Systems:

•    Explore the challenges and solutions for securing educational institutions, including protecting sensitive student data, ensuring the integrity of online learning platforms, and preventing cyber threats in academic environments.

Cyber security and Supply Chain Management:

•    Examine the importance of cyber security in securing the supply chain, addressing vulnerabilities in the procurement and distribution process to prevent cyber attacks on businesses and critical supply chain components.

Securing Personal and Consumer Devices:

•    Investigate the role of cyber security in protecting personal devices, such as smartphones, laptops, and smart home devices, to ensure the privacy and security of individuals in the digital age.

For more topics visit the National Cyber Security Centre website.

Components of this Assignment will require processing and visualisation of data, development and implementation of a data analysis component, a critical evaluation of its performance and presentation of the findings.

If you're struggling with your COM771 Cyber Security Module Handbook, our assignment help online for Ulster University students is here to assist. We provide help with cybersecurity assignments, and you can even get a free list of dissertation examples to guide you. Pay our experts to handle your coursework, and rest assured that all our work is 100% plagiarism-free content. With years of experience in the field, we offer unlimited assignments for UK students, ensuring you receive top-quality, tailored support.

 

 

Online Assignment Help in UK