Module Details

Module Code: COMP9080
Title: Security Architecture
Long Title: Security Architecture
NFQ Level: Expert
Valid From: Semester 1 - 2020/21 ( September 2020 )
Duration: 1 Semester
Credits: 10
Field of Study: 4811 - Computer Science
Module Delivered in: 2 programme(s)
Module Description: Security Architecture is defined as a description, placement and allocation of security functions and controls with the aim of maintaining IT systems quality attributes such as confidentiality, integrity and availability. This module explores how an organisation can implement cybersecurity controls and organise its infrastructure best so that it can deter and respond to attacks when they occur. As part of this module security devices and products will also be explored in the context of their application as part of an overall security architecture implementation.
 
Learning Outcomes
On successful completion of this module the learner will be able to:
# Learning Outcome Description
LO1 Evaluate the applicability and use of Cybersecurity Architecture Frameworks to support and implement security features in an organisation.
LO2 Appraise the effectiveness of an organisation’s Identity and Access Control (IAC) mechanisms.
LO3 Evaluate and secure a network through the appropriate design, placement and configuration of networking technologies, techniques and protocols.
LO4 Critically assess the security of a cloud based virtualised infrastructure with the aim of protecting data, application and services of cloud computing resources.
LO5 Appraise the application of cybersecurity controls and technologies used by an organisation to prevent an attack.
LO6 Appraise the application of cybersecurity controls and technologies used by an organisation to detect and respond to a successful attack.
LO7 Evaluate the security of an organisation from an Architecture viewpoint using each element of the Availability, Integrity, Confidentiality (AIC) Triad as a guide.
Dependencies
Module Recommendations

This is prior learning (or a practical skill) that is strongly recommended before enrolment in this module. You may enrol in this module if you have not acquired the recommended learning but you will have considerable difficulty in passing (i.e. achieving the learning outcomes of) the module. While the prior learning is expressed as named MTU module(s) it also allows for learning (in another module or modules) which is equivalent to the learning specified in the named module(s).

Incompatible Modules
These are modules which have learning outcomes that are too similar to the learning outcomes of this module. You may not earn additional credit for the same learning and therefore you may not enrol in this module if you have successfully completed any modules in the incompatible list.
No incompatible modules listed
Co-requisite Modules
No Co-requisite modules listed
Requirements

This is prior learning (or a practical skill) that is mandatory before enrolment in this module is allowed. You may not enrol on this module if you have not acquired the learning specified in this section.

No requirements listed
 
Indicative Content
Frameworks for Enterprise Security Architecture
SABSA - Enterprise Security Architecture. Cross Boundary Enterprise Security Framework (CB ESM). Cybersecurity Operations Centre (CSOC). The Open Group Architecture Framework (TOGAF). Critical review and comparison of different frameworks.
Cryptography
Cryptography as a security control. Symmetric, Public Key, Hashing, Digital Signatures, Key Exchange, Public Key Infrastructure, TLS, Code and Update Signing.
Passwords and Authentication
Authentication Controls. Password representations, Entropy, Password Cracking, Salting and Hashing, Password Spraying Attack, Passwordless Authentication, Biometrics, MFA, Authentication vs. Authorisation (e.g. SAML verses OAuth)
Access Control
Role Based, Discretionary, Non-discretionary, Mandatory. Access Control Technologies : Single Sign On (SSO), Identity As A Service (IaaS), Link Discovery Access Protocol (LDAP), Kerberos, Active Directory (AD), Identity and Access Management, Privileged Access Management (PAM). Information Rights Management (IAM).
Networking
LAN and WAN technologies and protocols, OSI model, TCP, IP, UDP, ICMP, Encapsulation, Wireless LANs, Routers, SNMP, Switches, Port Security, Modems, VPN Communication, Network Segmentation, VLANs, DMZ, Logging the network (PCAP, netflow, Zeek logs etc.), Application Layer Protocols (e.g. DNS, DHCP), DoH, Network based attacks such as DDoS. Lateral Movement Detection, C2 Traffic Detection, Data Exfiltration Detection, Secure configuration of network devices, BGP, OSPF, IPv6, Proxies, Load Balancers, Routing tables, Network segmentation between the OT and IT environments, Purdue Model, Dealing with Encrypted Traffic, Secure Network Design. Zero Trust Networks.
Cloud Security
Security Architecture and Networking Technologies as they apply and are used in the Cloud. Policies, technologies and control to protect cloud resources. Data Centres, Virtualisation, Data Containers, Automation, Micro-segmentation.
Security Technologies and Products
Firewalls, IPS/IDS, DLP, SIEM, Log Correlation and Management, UTM, User and Entity Behaviour Analytics (UEBA), Honeypots, Network Traffic Analysis, Threat Feeds, Next Generation, Anti-Virus, Patch Management, Change Management, Perimeter Management, Web Security, Email Security, Server Security, Defence in Depth, SOC, NOC, Network Monitoring Devices. Deployment of these to prevent and detect attacks.
Security Testing
Mechanisms to detect vulnerabilities of a system. Vulnerability Scanning, Penetration Testing, Red and Purple Teaming, Log Reviews, Software Testing, Third Party Software, API Security
Product Security Architecture
Designing software with security in mind. Where security controls fit into software design and development. Secure Software Development Lifecycle. Privacy by Design. Protecting IP in software products. Managing third party and technology partner ecosystem risks. Chip-to-Cloud Security. Secure product support, OWASP Top 10, Web App Firewalls
Case Studies
Organisations and their approach to Security Architecture, AIC Triad considerations, Gap Analysis, Scoping, Budgets
Module Content & Assessment
Assessment Breakdown%
Coursework100.00%

Assessments

Coursework
Assessment Type Written Report % of Total Mark 30
Timing Week 5 Learning Outcomes 3,4
Assessment Description
Lab report detailing and critiquing assigned tasks carried out. This assessment will focus mainly on networking and cloud technologies.
Assessment Type Written Report % of Total Mark 30
Timing Week 10 Learning Outcomes 2,5,6
Assessment Description
Lab report detailing and critiquing assigned tasks carried out. This assessment will focus mainly on Identity and Authentication, cybersecurity devices and technologies and logs.
Assessment Type Project % of Total Mark 40
Timing Sem End Learning Outcomes 1,2,4,5,6,7
Assessment Description
Design a Security infrastructure for an organisation evaluating parameters such as reliability, cost and security.
No End of Module Formal Examination
Reassessment Requirement
Coursework Only
This module is reassessed solely on the basis of re-submitted coursework. There is no repeat written examination.

The University reserves the right to alter the nature and timings of assessment

 

Module Workload

Workload: Full Time
Workload Type Contact Type Workload Description Frequency Average Weekly Learner Workload Hours
Lecture Contact Lecture underpinning learning outcomes. Every Week 4.00 4
Lab Contact Lab supporting content delivered in class. Every Week 2.00 2
Directed Learning Non Contact Independent study. Every Week 8.00 8
Total Hours 14.00
Total Weekly Learner Workload 14.00
Total Weekly Contact Hours 6.00
Workload: Part Time
Workload Type Contact Type Workload Description Frequency Average Weekly Learner Workload Hours
Lecture Contact Lecture underpinning learning outcomes. Every Week 4.00 4
Lab Contact Lab supporting content delivered in class. Every Week 2.00 2
Directed Learning Non Contact Independent study. Every Week 8.00 8
Total Hours 14.00
Total Weekly Learner Workload 14.00
Total Weekly Contact Hours 6.00
 
Module Resources
Recommended Book Resources
  • Brook S. E. Schoenfield. (2019), Secrets of a Cyber Security Architect, Auerbach, [ISBN: 9781498741996].
Supplementary Book Resources
  • Gerard Blokdyk. (2017), Enterprise Information Security Architecture: A Complete Guide, CreateSpace, [ISBN: 9781977702067].
  • Pass Always. (2019), ISSAP Information Systems Security Architecture Professional Study Guide: ISC CISSP-ISSAP, Independently published, [ISBN: 9781079333619].
  • Brook S. E. Schoenfield. (2017), Securing Systems: Applied Security Architecture and Threat Models, CRC Press, [ISBN: 9781482233971].
  • Paul Thomas. (2017), Designing Security Architecture Solutions, CreateSpace, [ISBN: 9781979805209].
Supplementary Article/Paper Resources
  • NIST. (2020), Security and Privacy Controls for Information Systems and Organizations, Draft NIST Special Publication 800-53 Revision 5.
  • NIST. (2013), Security and Privacy Controls for Federal Information Systems and Organizations, NIST Special Publication 800-53 Revision 4.
  • NIST. (2013), Cloud Computing Security Reference Architecture, Draft NIST Special Publication 500-299.
Other Resources
 
Module Delivered in
Programme Code Programme Semester Delivery
CR_KCYMN_9 Master of Science in Cybersecurity Management 1 Mandatory
CR_KCYMT_9 Postgraduate Diploma in Science in Cybersecurity Management 1 Mandatory