Module Details

Module Code: COMP9084
Title: Security Group Project
Long Title: Security Group Project
NFQ Level: Expert
Valid From: Semester 2 - 2020/21 ( January 2021 )
Duration: 1 Semester
Credits: 10
Field of Study: 4811 - Computer Science
Module Delivered in: 2 programme(s)
Module Description: As part of this module students will be assigned a substantive project simulating a real life problem aligned to their programme of study. Through completion of the project the student will develop a range of technical, transferable, teamwork, oral and written communication and presentation skills.
 
Learning Outcomes
On successful completion of this module the learner will be able to:
# Learning Outcome Description
LO1 Critically evaluate the problem statement with the aim of understanding the project requirements.
LO2 Autonomously manage learning without the need for formal instruction demonstrating ones ability to take ownership of their learning and performance as part of a group project.
LO3 As part of a team, plan and organise activities related to the project within a limited timeframe.
LO4 Interpret, evaluate, document and present project findings with the aim of demonstrating the impact of the project aligned to the programme of study.
LO5 Effectively communicate with team members with the aim of achieving project objectives.
Dependencies
Module Recommendations

This is prior learning (or a practical skill) that is strongly recommended before enrolment in this module. You may enrol in this module if you have not acquired the recommended learning but you will have considerable difficulty in passing (i.e. achieving the learning outcomes of) the module. While the prior learning is expressed as named MTU module(s) it also allows for learning (in another module or modules) which is equivalent to the learning specified in the named module(s).

Incompatible Modules
These are modules which have learning outcomes that are too similar to the learning outcomes of this module. You may not earn additional credit for the same learning and therefore you may not enrol in this module if you have successfully completed any modules in the incompatible list.
No incompatible modules listed
Co-requisite Modules
No Co-requisite modules listed
Requirements

This is prior learning (or a practical skill) that is mandatory before enrolment in this module is allowed. You may not enrol on this module if you have not acquired the learning specified in this section.

No requirements listed
 
Indicative Content
Example Project - Malware Infection
An example project specification may be a scenario where an employee within an organisation used a companies digital camera for business purposes and in doing so loaded the SD card of the camera into their personal computer which was infected with malware. When the SD card was inserted back into the companies IT system the malware spread impacting on its business operations. The purpose of the project would be to develop a security architecture and business contingency plan to mitigate against the attack, evaluate security management frameworks and the impact of the attack in terms of user privacy, legal and regulatory requirements.
Example Project - Unplanned Attack
An example project specification in this case would detail how a hacktivist group has targeted an organisation. The company know that they are targeted but do not know the nature or format of the attack. The project will require the student to implement a plan to improve the security posture of the organisation in order to protect it. The project will require the student to apply their learning across a range of modules delivered as part of the programme.
Example Project - Cloud Compromise
In a fictional company, an internal department used outside cloud storage to store large amounts of data, some of which may be considered sensitive. Unfortunately, the cloud storage provider that is being used has been publicly compromised and large amounts of data have been exposed. All user passwords and data stored in the cloud provider’s infrastructure may have been compromised. As part of the project the student will be expected to review the organisations current policies in relation to use of cloud computing resources, analyse the impact of the breach and determine how it is accountable. The project will require the student to apply their learning across a range of modules delivered as part of the programme.
Module Content & Assessment
Assessment Breakdown%
Coursework100.00%

Assessments

Coursework
Assessment Type Essay % of Total Mark 20
Timing Week 2 Learning Outcomes 1,2
Assessment Description
The student will define a project and its requirements addressing a real life problem aligned to the programme of study.
Assessment Type Project % of Total Mark 60
Timing Sem End Learning Outcomes 2,3,4,5
Assessment Description
As part of this assessment the project will be evaluated by the academic supervisor. The evaluation will comprise of team member feedback, artifact produced, project report and presentation.
Assessment Type Presentation % of Total Mark 20
Timing Sem End Learning Outcomes 2,3,4,5
Assessment Description
The student will be expected to present findings of their projects to the academic supervisors.
No End of Module Formal Examination
Reassessment Requirement
Coursework Only
This module is reassessed solely on the basis of re-submitted coursework. There is no repeat written examination.

The University reserves the right to alter the nature and timings of assessment

 

Module Workload

Workload: Full Time
Workload Type Contact Type Workload Description Frequency Average Weekly Learner Workload Hours
Lecturer-Supervised Learning (Contact) Contact Meeting with Academic Supervisor. Every Week 0.25 0.25
Independent & Directed Learning (Non-contact) Non Contact Group based project activity. Every Week 13.75 13.75
Total Hours 14.00
Total Weekly Learner Workload 14.00
Total Weekly Contact Hours 0.25
Workload: Part Time
Workload Type Contact Type Workload Description Frequency Average Weekly Learner Workload Hours
Lecturer-Supervised Learning (Contact) Contact Meeting with Academic supervisor. Every Week 0.25 0.25
Independent & Directed Learning (Non-contact) Non Contact Group based project activity. Every Week 13.75 13.75
Total Hours 14.00
Total Weekly Learner Workload 14.00
Total Weekly Contact Hours 0.25
 
Module Resources
Recommended Book Resources
  • Judith Bell & Stephen Waters. (2018), Doing your research project: A guide for first time researchers, 7th. Open University Press, [ISBN: 9780335243389].
  • PMBOK Guide. (2017), A Guide to the Project Management Body of Knowledge, 6th. Project Management Institute, [ISBN: 9781628251845].
This module does not have any article/paper resources
Other Resources
 
Module Delivered in
Programme Code Programme Semester Delivery
CR_KCYMN_9 Master of Science in Cybersecurity Management 2 Group Elective 1
CR_KCYMT_9 Postgraduate Diploma in Science in Cybersecurity Management 2 Group Elective 1