Description
Aims:
The module aims to equip students to beÌýaware of the conceptual foundations of security policy and technology and their role in delivering robust, reliable systems; to be specialists in understanding the political context within which security policy and its implementation is situated; and to beÌýspecialists in understanding the design and implementation of security policy from the perspective of economics, including ideas and tools from areas such as utility theory, game theory, and portfolio theory.
Intended learning outcomes:
On successful completion of the module, a student will be able to:
- Understand concepts and philosophy of security and privacy, including:
- declarative and operational concepts.
- the relationships between security and privacy.
- the relationships between people, policy, and systems.
- Understand politics of security and privacy, including:
- the perspectives of individuals, companies, and governments.
- international relations, strategy, cyber-conflict.
- understanding tensions in policy and legislation.
- Understand economics of security and privacy, including:
- utility, incentives, public goods, externalities and internalities, and trade-offs.
- games in security and privacy.
- using models to understand policy, technology, and decision-making.
- Develop conceptual analyses of systems and policies in socio-economic contexts.
- Assess the consequences and value of models of security and privacy.
- Organize and communicate complex ideas and arguments in precise, accessible written form.
Indicative content:
The following are indicative of the topics the module will typically cover:
The module covers in depth major issues in computer, information, and general security related to the following perspectives:
- Conceptual and philosophical foundations of security policy and its implementation in systems’ contexts.
- The political context within which security policies and their implementations are situated, including national and international security issues and the relationships between individuals, companies, and governments.
- The design and implementation of security policy from the perspective of economics, including ideas and tools from areas such as utility theory, game theory, and portfolio theory.
Requisites:
To be eligible to select this module as optional or elective, a student must: (1) be registered on a programme and year of study for which it is a formally available; and (2) also select Computer Security I (COMP0054).
Module deliveries for 2024/25 academic year
Last updated
This module description was last updated on 19th August 2024.
Ìý