Master Information Technology Security

Speak without obligation to University of Westminster

To contact you must accept the privacy policy

Image gallery

Comments about Master Information Technology Security - At the institution - London - Greater London

  • Objectives
    Every day the media reports stories of hackers breaking into major systems. The computer virus forms a major theme of many stories while the internet is accused of offering new ways of committing unspeakable crimes. Any company which gathers data – whether large or small, public or private sector – needs to take precautions against the potential loss of information from criminal or careless action. In a society in which information is power, that also means securing the integrity, privacy and confidentiality of this data. The MSc IT Security is designed to provide a flexible response to this need for computing and associated professionals.
  • Entry requirements
    The course is open to professionals with several years experience in computing who are usually graduates in Computer Science with a First or Second Class Honours degree from a British university or equivalent qualification and to non-computing professionals such as solicitors, barristers, bankers, accountants and police and other occupations who combat computer crime. Each applicant is considered on his or her own merits. A flexible attitude will be taken towards those employed in an industrial or academic context that is related to IT Security and formal qualifications are not necessarily required. MSc IT Security: Book Review You are asked to write a book review in no more than 1000 words on any one book that is relevant to Information Technology Security. Critically assess the strengths and weaknesses of this book. The submission of the review does not guarantee a place on the course. The review will be used to assess your level of ability and evaluate suitability for the course. Only the admissions tutor can determine whether the review has been ‘successfully’ competed. The admissions tutors decision is final. If you are stuck for choice then I have provided examples of relevant texts below: Forrester, T. & Morrison, P. (1995) Computer Ethics, London MIT Press Garfinkel, S. & Spafford, G. (1997) Web security & Commerce, Cambridge:O’Reilly Russell, D. & Gangemi Sr., G.T. (1991) Computer Security Basics, Sebastapol: O’Reilly Parker, D. (1998) Fighting Computer Crime, London: Wiley Stoll, C. (1991) The Cuckoo’s Egg, London: Pan Do not feel restricted to the list above.
  • Academic title
    MSc Information Technology Security
  • Course description
    Introduction
    Conforming to the requirements of the CBI, British Computer Society (BCS), Council of European Professional Informatics Societies (CEPIS) and the National Computer Users’ Forum (NCUF) guidelines on Information Technology Security, this innovative course programme is designed to enable graduates to achieve the complete design and implementation of a security policy tailored to the specific company setting and to deal effectively with any breaches or attempted breaches.

    Course Content
    The MSc IT Security is designed to provide a flexible response to the need for computing and associated professionals that can prevent the potential loss of information from criminal or careless action by operating in intensive modules usually lasting five days each. These can be taken sequentially as a standard full time course (12 months) or part time (up to 5 years). The course commences in September or February in each year.

    As a package they provide a comprehensive treatment of all of the activities involved in creating and implementing the security policy for a major organisation and the opportunity to achieve a recognised and challenging postgraduate qualification. Each module is supported by appropriate documentation.

    Teaching and Assessment
    This MSc course consists of seven taught modules and a Project dissertation. The project is expected to be equal to three months full time work and is equivalent to two modules (40 credits). Full time students starting in September undertake the project between July and September. Full time students starting in February will complete their project between February and June (12 to 16 months after beginning the course). It is recommended that part-time students do so between July and December at the end of the second year.

    The course is taught at the Harrow Campus (Northwick Park underground station), an integrated academic and residential community of 4.500 students with a first rate library and a professional and inclusive culture. The Campus is equipped with a high speed fibre optic network and industry-standard equipment. It is easily accessible from central London and the M25 by road and public transport. Teaching comprises a mix of seminar and laboratory sessions led by experienced practitioner academics.

Other programs related to information quality and security

This site uses cookies.
If you continue navigating, the use of cookies is deemed to be accepted.
See more  |