Information Security

Important Information for Students on Moodle Course Availability

You may not see a full list of all your expected courses in your Moodle My Courses list or in this category. This does not necessarily mean that your course registrations are incorrect. There are two possible reasons:

  • Departments/Tutors make courses visible to Students in Moodle when the course is ready for teaching
  • Not all courses use Moodle.

You can use the Study tab in Campus Connect to check the courses you are registered for or contact your department who can also provide information on their use of Moodle.

18-19 IY3840: Malicious Software

Cybercrime has become both more widespread and harder to battle. Researchers and anecdotal experience show that the cybercrime scene is becoming increasingly organized and consolidated, with strong links also to traditional criminal networks. Modern attacks are indeed stealthy and often profit oriented.

Malicious software (malware) is the traditional way in which cybercriminals infect user and enterprise hosts to gain access to their private, financial, and intellectual property data. Once stolen, such information can enable more sophisticated attacks, generate illegal revenue, and allow for cyber-espionage.

By mixing a practical, hands-on approach with the theory and techniques behind the scene, the course discusses the current academic and underground research in the field, trying to answer the foremost question about malware and underground economy, namely, "Should we care?".

Students will learn how traditional and mobile malware work, how they are analyzed and detected, peering through the underground ecosystem that drives this profitable but illegal business. Understanding how malware operates is of paramount importance to form knowledgeable experts, teachers, researchers, and practitioners able to fight back. Besides, it allows us to gather intimate knowledge of the systems and the threats, which is a necessary step to successfully devise novel, effective, and practical mitigation techniques.

18-19 IY5501: Security Management

All eleven lectures will be in the Shilling Auditorium from 14:00-17:00 on Wednesday afternoons.  The first lecture will be on October 3rd 2018 and the last lecture on December 12th 2018.

18-19 IY5511: Network Security

First term, core module for Technical Pathway only.


This module is concerned with the protection of data transferred over commercial information networks, including computer and telecommunications networks. After an initial brief study of current networking concepts, a variety of generic security technologies relevant to networks are studied, including user identification techniques, authentication protocols and key distribution mechanisms. This leads naturally to consideration of security solutions for a variety of types of practical networks, including LANs, WANs, proprietary computer networks, mobile networks and electronic mail.


At the end of the module students should have gained an understanding of the fundamentals of the provision of security in information networks, as well as an appreciation of some of the problems that arise in devising practical solutions to network security requirements.

18-19 IY5512: Computer Security (Operating Systems)

IY5512 is one of the four compulsory modules on the Information Security MSc. The aims of the computer security module are to introduce the security issues that computer systems must address and to describe some of the techniques for implementing security in operating systems.

Teacher (Course Author): Konstantinos Mersinas, Daniele Sgandurra

18-19 IY5522: Security Technologies

IY5522 Summary:
This course provides an overview of the core technologies which underpin the provision of security services in computer and network security.

18-19 IY5523: Secure Business Architectures

IY5523: Secure Business Architectures
This course gives a broad overview of topics that impact the delivery of security architectures within a modern information processing system.

18-19 IY5607: Software Security

Software Security will:

1. Identify and exploit the software vulnerabilities that can be introduced into programs through language features and poor programming practice;
2. Discuss the countermeasures that can mitigate the exploitation of such software vulnerabilities;
3. Introduce (briefly) malicious software (malware) as a typical consequence of a successful software exploitation, nowadays;
4. Provide pointers to/discuss academic and/or industry research-oriented publications on the subject