The University of Sheffield
Department of Computer Science

COM3527 Cyber Security Team Project

Summary

Cyber Security Team Project is a module that equips students with the knowledge needed to keep an organisation secure from today's cyber security threats and presents the necessary steps to take when a breach occurs.

Using a combination of learning methods and teaching techniques such as project based learning, active learning and case studies, this module teaches cyber security management principles that are needed to secure the digital assets of an organisation. A major part of this module involves students working in teams to evaluate and develop secure policies and strategies to solve real-world cyber security issues for organisations.

Students should be aware that there are limited places available on this module.

Session Autumn 2021/22
Credits 10 credits
Assessment
  • Coursework
  • Group Report
Lecturer(s) Dr Olakunle Olayinka
Resources
Aims

This module aims to:

  • Develop an understanding of cyber security management principles and incident handling;
  • Equip students with knowledge and skills required to identify, protect, detect and deter threats to predominantly digital assets of an organisation;
  • Provide students with experience of working in security teams, solving real cyber security issues, using industry standard tools and frameworks
Objectives

On completion of this module, students will be able to:

  • Explain cyber security fundamentals, concepts and management principles
  • Identify insecure practices and present solutions in clear unambiguous terms to stakeholders
  • Critically evaluate and propose cyber security policies, standards and countermeasures to be implemented in organisations
  • Analyse existing mechanisms, identify their strengths and weaknesses and how they could be exploited
  • Demonstrate ability to work in teams to solve real world security problems and present solutions
Content This module teaches cyber security management topics and principles such as
Threat Analysis & Modelling
Security Policies & Awareness
Physical & Technical Defences
Security Monitoring Strategies
Incident Handling & Response
Restrictions Available to students in Computer Science only. The maximum number of students allowed on the module is 40.
Teaching Method

Students learn the course matter through a mixture of lectures and tutorials. In the first 6 weeks of the semester, training will be provided in a flipped classroom style. Students will study material in the online learning environment and attend training sessions, whilst also working on an industry based case study.

The later part of the module involves students working in teams to evaluate and develop secure policies and strategies to solve real-world cyber security issues for organisations.

Feedback

Students will be given formative (i.e. non marked) feedback on the first part of the assignment during lecture and tutorial sessions. Written feedback will also be provided on the assignment submitted early in the semester.

For the second part of the module, students will meet weekly as a team with their mentor to discuss their progress and plans. The mentor will offer feedback and guidance, and encourage the students to be proactive in developing their knowledge and skills in appropriate areas. Written feedback will also be provided on the group report.

Recommended Reading
  • Taylor, A. et al. (2013) Information Security Management Principles. BCS Learning & Development Limited (Information Security Management Principles).
  • Shostack, A. (2014) Threat Modeling: Designing for Security. Wiley.
  • Pfleeger, C. P. and Pfleeger, S. L. (2002) Security in Computing. 3rd edn. Prentice Hall Professional Technical Reference.
  • Stallings, W. and Brown, L. (2018) Computer Security: Principles and Practice. Pearson Education, Incorporated.
IP Exemption
This module is exempt from the University's Regulations relating to Intellectual Property which can be found at: https://www.sheffield.ac.uk/apse/apo/quality/policies-guidance/ip