Launching into Cyber Security - Notes

Lecturecast, Essential & Additional Reading Notes

The Lecturecast, Essential & Additional reading notes are broken down into units, each unit represents a week i.e. 7 days

Unit 1

The reading this week focuses on an introduction to Cyber Security, the types of threats and security measures. We will then look at ethics and governance framework, legislation, and the role of Cyber Security professionals in an organisation (Danso, 2021).

The following Essential and Additonal reading components was completed this week

Essential Reading

Department of Computer Science (2019) Cybersecurity Roles and Job Titles. School of Engineering & Applied Sciences, The George Washington University.

Intersoft consulting (2019) General Data Protection Regulations.

Troncoso, C. (2019) Privacy & Online Rights Knowledge Area Issue 1. The Cyber Security Body of Knowledge.

VanSyckel, L (2018) Introducing Cybersecurity. Sealevel Systems, Inc.

Department for Digital, Culture, Media and Sport (2019) Cyber Security Breachers Survey.

Additional Reading

Gambs, S., Killijian, M. & del Prado Cortez M. N. (2011) Show me how you move and I will tell you who you are. Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS. 34-41.

Williams, L. (2019) Secure Software Life Cycle, Knowledge Area Issue 1. The Cyber Security Body of Knowledge.

CyBOK Knowledgebase (2019).

List of References

Danso, S. (2021) Launching into cyber security. LCYS_PCOM7E August 2021 Launching into Cyber Security. University of Essex Online.


Unit 2

The reading this week focuses on Cyber Security within the context of Data Protection Acts; jurisdiction issues around ethics, privacy and governance frameworks using the General Data Protection Regulations principles and how security must be designed to conform to these standards (Danso, 2021).

The following Essential reading was completed this week

Essential Reading

Brookshear, J. G (2020) Computer Science: an overview. 13th ed. Addison Wesley Longman Inc.

  • Chapter 4
  • Chapter 9

List of References

Danso, S. (2021) Launching into cyber security. LCYS_PCOM7E August 2021 Launching into Cyber Security. University of Essex Online.


Unit 3

The reading this week focuses on design approaches and their application (Danso, 2021).

The following Essential & Additional reading was completed this week

Essential Reading

Anderson, R. (2008) Security Engineering: A Guide to Building Dependable Distributed Systems. 2nd ed. Wiley Publishing Inc.

  • Chapter 2
  • Chapter 4
  • Chapter 15
  • Chapter 21

Howard M. and LeBlanc. D. (2003) Writing Secure Code. 2nd ed. Microsoft Press.

  • Chapter 2
  • Chapter 4
Additional Reading

Williams, L (2019) Secure Software Life Cycle Knowledge Area Issue 1. The Cyber Security Body of Knowledge.

Centre for Secure Design (2014) Avoiding the top 10 software security design flaws. IEEE Computer Society.

McAfee (2019) What is Stuxnet?

Dargahi, T., Dehghantanha, A., Bahrami, P.N., Conti, M., Bianchi, G. & Benedetto, L.(2019) A cyber-kill-chain based taxonomy of crypto-ransomware features. Journal of Computer Virology and Hacking Techniques 15(4): 277-305.

List of References

Danso, S. (2021) Launching into cyber security. LCYS_PCOM7E August 2021 Launching into Cyber Security. University of Essex Online.


Unit 4

The reading this week focuses on the approaches to security design (Danso, 2021).

The following Essential & Additional reading was completed this week

Essential Reading

Howard M. and LeBlanc. D. (2003). Writing Secure Code. 2nd ed. Microsoft Press.

  • Chapter 2
  • Chapter 3

Additional Reading

Anderson, R. (2008) Security Engineering: A Guide to Building Dependable Distributed Systems. 2nd ed. Wiley.

  • Chapter 4
  • Chapter 5
  • Chapter 8
  • Chapter 11

Damodaran, M. (2006) Secure software development using use cases and misuse cases. Issues in Information Systems 7(1): 150-154.

Khan, R., McLaughlin, K., Laverty, D. & Sezer, S. (2017) STRIDE-based threat modelling for cyber-physical systems. IEEE PES Innovative Smart Grid Technologies Conference Europe (ISGT-Europe), Torino.1-6.

List of References

Danso, S. (2021) Launching into cyber security. LCYS_PCOM7E August 2021 Launching into Cyber Security. University of Essex Online.


Unit 5

The reading this week focuses on the implementation of security designed solutions (Danso, 2021).

The following Essential & Additional reading was completed this week

Essential Reading

Anderson, R. (2008) Security Engineering: A Guide to Building Dependable Distributed Systems. 2nd ed. Wiley Publishing Inc.

  • Chapter 4
  • Chapter 5

Ambler, S. W. (2003) The Elements of UML Style. Cambridge, UK: Cambridge University Press.

  • Chapter 1,2,3,4,8,10

Additional Reading

Vazquez, F. (2019) Graph Databases. What's the Big Deal. Towards data science.

van Rossum, G., Warsaw, B. & Coghlan, N. (2013) Python Developer's Guide.

Howard M. and LeBlanc. D. (2003) Writing Secure Code. 2nd ed. Microsoft Press.

  • Chapter 6,7,8

Connolly, T. & Begg, C. (2005). Database Systems. A Practical Approach to Design, Implementation, and Management. Reading: Pearson / Addison Wesley.

  • Chapter 2-14

Kong, J., Xu, D. and Zeng, X.(2010) UML-based modeling and analysis of security threats. International Journal of Software Engineering and Knowledge Engineering 20(6): 875-897.

List of References

Danso, S. (2021) Launching into cyber security. LCYS_PCOM7E August 2021 Launching into Cyber Security. University of Essex Online.


Unit 6

The reading this week focuses on the application of UML modelling techniques to security design. Topics should cover Abuse uses; class and sequence diagrams to model the system's behaviour to identify areas with potential threat and vulnerabilities. Reading should cover relevant Chapters in Booch, Rumbaugh & Jacobson, 1999 and Kong, Xu & Zeng, 2010. (Danso, 2021).

The following Essential & Additional reading was completed this week

Essential Reading

Ambler, S. W. (2003) The Elements of UML Style. Cambridge, UK: Cambridge University Press.

  • Chapter 1, 2, 3, 4, 8 & 10

Additional Reading

van Rossum, G., Warsaw, B. & Coghlan, N. (2013) Python Developer’s Guide.

List of References

Danso, S. (2021) Launching into cyber security. LCYS_PCOM7E August 2021 Launching into Cyber Security. University of Essex Online.


Unit 7

The following Essential & Additional reading was completed this week

Essential Reading

Downey, A., Elkner, J. & Meyers, C. (2012) How to Think Like a Computer Scientist. Learning with Python. Massachusetts, USA: Green Tea Press.

  • Chapter 1-7

Connolly, T. & Begg, C. (2005). Database Systems. A practical Approach to Design, Implementation, and Management. Reading. Pearson / Addison Wesley.

  • Chapters 10, 12, 13, 14, 16, 20, 21

Additional Reading

van Rossum, G., Warsaw, B. & Coghlan, N. (2013) Python Developer's Guide.


Unit 8

The reading this week focuses on Python programming concepts applications. Topics to be covered with implementation examples include working with variables, expressions and statements; data types and conversions, reading inputs and writing output as well as functions calls.

The following Essential reading was completed this week

Essential Reading

Connolly, T. & Begg, C. (2005). Database Systems. A practical Approach to Design, Implementation, and Management. Reading. Pearson / Addison Wesley.

  • Chapters 10, 12, 13, 14, 16, 20, 21


Unit 9

The reading this week focuses on materials on Python and MySQL programming.

The following Essential reading was completed this week

Essential Reading

Downey, A., Elkner, J. & Meyers, C. (2012) How to Think Like a Computer Scientist. Learning with Python. Massachusetts, USA: Green Tea Press.

  • Chapters 1 - 10


Unit 10

The reading this week focusses on understanding the basics of web application development which include creating HTML files, CSS and templates in Codio. Also, Chapters 5, 6, 7, and 8 of Mandez, 2014 are to be covered for the required theoretical knowledge.

The following Essential & Additional reading was completed this week

Essential Reading

Mandez, M. (2014) The Missing Link: An Introduction to Web Development and Programming. Createspace Independent Publishers.

  • Chapter 1-14

Additional Reading

Guide, G. (2020) Web programming languages: the best languages for web development. IONOS.

Netspaker Security Team (2019) Getting Started with Web Application Security application-security.


Unit 11

The reading this week focuses on web application development using Django frameworks. Topics to be covered include an introduction to Django; setting up Django development environment; creating basic website and applications; creating data models and user authentications covered in tutorials on Django of MDN Local Libraries (https://developer.mozilla.org/en-US/docs/Learn/Server-side/Django/Tutorial_local_library_website).

The following Essential reading was completed this week

Essential Reading

Behrens, M. (2012) The Django Book. Sphinx. Available from https://django-book.readthedocs.io/en/latest/index.html


Unit 12

The reading this week focuses on emerging trends and the evolution of the internet and associated technologies. The opportunities expected to be created by these new technologies, as well as the security implications of this evolution, are a few of the topics to be covered. The core articles are Maras, M.H. (2015); Miraz, M.H., Ali, M., Excell, P.S. & Picking, R. (2015) and Rashid, A Nautiyal, L & Rigby, Y. (2020)

The following Essential & Additional reading was completed this week

Essential Reading

Contributor, MDN. (2019) MVC, Mozilla.

Maras, M.H. (2015) Internet of Things: security and privacy implications. International Data Privacy Law 5(2).

Additional Reading

Williams, L. (2019) Secure Software Life Cycle Knowledge Area Issue 1. The Cyber Security Body of Knowledge.

Rashid, A., Nautiyal, L. & Rigby, Y. (2020) Cyber Security at Scale: Challenges for Research, Education and Training. The Cyber Security Body Of Knowledge.

Shi, W. & Dustdar, S. (2016) The promise of edge computing. Computer 49(5): 78-81.

Xu, X. (2012) From cloud computing to cloud manufacturing. Robotics and computer-integrated manufacturing. 28(1): 75-86.

Miraz, M.H., Ali, M., Excell, P.S. & Picking, R. (2015) A review on Internet of Things (IoT), Internet of everything (IoE) and Internet of nano things (IoNT). In 2015 Internet Technologies and Applications (ITA) IEEE pp.219-224.

Li, S., Da Xu, L. & Zhao, S. (2018) 5G Internet of Things: A survey. Journal of Industrial Information Integration. 10:1-9.

Balasubramaniam, S. & Kangasharju, J. (2012). Realising the internet of nano things: challenges, solutions, and applications. Computer 46(2): 62-68.