|1.||Critically review cryptographic algorithms such as DES, RSA and security standards;|
|2.||Survey and investigate specific security issues in networked computing environments;|
|3.||Analyse the security of computer systems, networks, databases, websites and e-business;|
|4.||Propose advanced solutions to prevent hacking, impersonation, forging;|
|5.||Design and implement protocols to protect networks against hacking.|
|Test||1,000 word (Individual)||15%|
|Presentation||15-minute presentation (Individual)||40%|
Understanding the risk society: Crime, security and justice.
Mythen, G. (2014).
Macmillan International Higher Education.
Where to next?
VU takes care to ensure the accuracy of this unit information, but reserves the right to change or withdraw courses offered at any time. Please check that unit information is current with the Student Contact Centre.