Search our site
Search our site

Network & Information Security / with Management Studies Masters (MSc)

Network & Information Security MSc

Mode Duration Start date
Full time 1 year September 2016
January 2017
Part time 2–3 years September 2016
January 2017

Network & Information Security with Management Studies MSc

Mode Duration Start date
Full time 1 year September 2016
January 2017
Part time 2–3 years September 2016
January 2017

Choose Kingston's Network & Information Security / with Management Studies MSc

Computer network and information security is of increasing importance – new legislation, technologies, vulnerabilities and threats necessitate frequent system updates. This course aims to equip you with technical knowledge of current and emerging technologies and an understanding of the underlying theory of cryptography, networking and network security technologies. You will learn to assess, plan, design and develop secure and reliable networks and systems. You can combine this course with management studies.

Key features

  • This course is accredited by BCS, The Chartered Institute for IT.
  • The course is taught in a specialist data communications lab with access to the latest networking and security equipment from vendors such as Cisco, Microsoft and Clavister. Current and emerging technology will also be demonstrated by representatives from industry.
  • You will have the option to work in one of our state-of-the-art research labs, called WMN (Wireless Multimedia and Networking). WMN is involved in EU and UK research collaborations and offers opportunities for advanced research and short-term research fellowships on completion of your MSc degree.

What will you study?

You will gain a critical awareness of the current developments and future trends in cryptography, network security and wireless security, starting from the mathematical principles behind cryptographic algorithms and moving on to secure network protocols.

As security and dependability are inextricably linked, the course also covers dependable and highly available architectures. Techniques and technologies to combat threats will be explored, from secure authentication mechanisms, through firewalls, to information policies and user education to combat social engineering and data leakage.

The Management Studies route will set your technical knowledge in a management context.

Assessment

Industrial report and technical article coursework, examinations, verbal presentations, project dissertation.

Course structure

The full MSc course consists of an induction programme, four taught modules, and project dissertation. Please note that this is an indicative list of modules and is not intended as a definitive list.

Network and Information Security MSc modules

  • This core module provides an overview of cryptography and various applications in information security, communication and computer science. This module deals with mathematical principles on which cryptography is based to include cryptographic algorithms, including practical examples of breaking codes. Additional techniques such as information hiding and secret sharing are progressively introduced. An introduction to advanced and emerging cryptographic techniques such as elliptic curve cryptography and quantum techniques.

    On successful completion of the module, students will be able to:

    • review concepts in computational number theory and their relevance for the design of secure and efficient techniques in cryptography;
    • describe and deploy common symmetric and asymmetric encryption algorithms used as standards in modern cryptosystems;
    • compare and contrast the properties of hash functions and attacks on them, and be familiar with their use in digital signature algorithms and their role in security protocols;
    • explain techniques for information hiding and secret sharing, and analyse their applications in security;
    • analyse cryptographic protocols for implementing a wide range of security requirements; and
    • critically discuss applications of cryptography including the latest and future trends.
     
  • The core module provides an overview of a wide range of security aspects and techniques of computer networks, both cabled and wireless. An introduction to basic aspects of information security progressing to cryptography. After studying fundamental concepts and algorithms, the topic of network security is introduced.

    On successful completion of the module, you will be able to:

    • critically discuss legal and ethical aspects of computer security;
    • compare and contrast data encryption algorithms suitable for encrypting, signing and protecting data and highlight their correct usages and significance in different security protocols;
    • analyse, model and evaluate the performance and security vulnerabilities, threats, risks and controls of cabled and wireless networks;
    • evaluate the role of firewalls, intrusion detection systems and vulnerability assessment tools in monitoring and securing a network, and analyse the protection provided by them;
    • discuss the statistical underpinnings of network traffic modelling including Erlang's theorems and queuing system in equilibrium; and
    • apply appropriate methodology to formulate the data, performance and security requirements of an organisation, to obtain potential solutions.
     
  • This core module provides a working knowledge of data communications covering TCP/IP networks and digital communications. Topics covered include transport layer services, multiplexing, TCP congestion control, network layer – network service models, IP addressing and IP network design, routing principles, dynamic routing, digital transmission, modulation, multiplexing and channel coding.

    On successful completion of the module, you will be able to:

    • Compare computer network architectures.
    • Evaluate the performance of TCP under varying flow control and congestion conditions.
    • Design an IP addressing scheme for a network.
    • Define and calculate transmission performance over a communication link.
    • Study and analyse characteristics of modulation methods.
     
  • This module constitutes the major individual piece of work of the masters programme where you will carry out a project involving independent critical research, design and implementation (where applicable).

    On successful completion of the module, you will be able to:

    • Select, justify and use effectively the research methods and techniques appropriate for particular cases in order to carry out a literature search and an independent work of research.
    • Critically identify the need to position your research in the wider academic or business context and structure the dissertation format to agreed conventions.
    • Plan, manage and critically evaluate the project using the techniques and tools needed in order to bring it in successfully on time and within resourcing limits.
    • Identify and critically analyse real-world problems or knowledge gaps to which academic concepts and methods can be realistically applied to improve or resolve the problem situation.
    • Apply skills to show an ability to engage in academic and professional communication with others in their field through report and presentation.
    • Present critical awareness in applying appropriate legal, social or ethical obligations and when required, respond to the financial and other constraints of a corresponding business environment.
     
  • Choose from:

    • This module addresses the theory and practice of multimedia communication systems and networks, with a special focus on multimedia signals (audio, images and video) and relevant compression and transmission techniques.

      The first part of the module focuses in particular on the representation of multimedia sources and on lossless and lossy compression methods for data, audio, image and video signals.

      The second part of the module focuses in particular on the transmission of multimedia sources over communication systems and networks and on the strategies adopted to protect multimedia content from channel and network errors and losses.

      On successful completion of the module, you will be able to:

      • Articulate the various types of multimedia networks and the trends in multimedia communications and networking.
      • Critically analyse specific source coding techniques for multimedia sources.
      • Critically analyse multimedia transmission systems and protocols.
      • Measure, analyse and specify the QoS support required by different multimedia sources.
      • Appraise different aspects in the design, operation, and implementation of advanced multimedia communication systems and apply the learned concepts in a laboratory environment.
      • Write succinct, accurate technical reports.
       
    • This module addresses theory and practice of wireless communication systems and networks, including the most recent wireless communication standards. This module will focus on the propagation characteristics of wireless channels and the main techniques for efficient communication, including modulation and channel coding. Practical and useful knowledge of the wireless industry will be provided to include real-world wireless systems and networks covering wireless broadband systems and wireless sensor networks.

      On successful completion of the module, you will be able to:

      • Develop an appreciation of a wide range of  wireless communication systems and networks.
      • A comprehension of the propagation characteristics of wireless channels.
      • An understanding of digital modulated transmission and of channel coding for wireless systems.
      • An understanding of multiplexing and multiple access techniques used for wireless networking.
      • The tools for system design and deployment, as well as performance estimation, evaluation and measurement for wireless networks.
      • An in-depth understanding of advanced  technologies, standards' update, system architecture and performance characteristics, in particular for All-IP networks WLANs, cellular / broadband wireless systems and wireless sensor networks, as well as relevant legal and regulatory aspects.
       
    •  

      This module will provide you with a comprehensive knowledge into the main areas of mobile computing and its security aspects. Mobile communication modalities will be covered, including 3G/4G communication networks, Wi-Fi and personal area networks, mobile privacy and ethical issues. The gained knowledge will be applied in different mobile computing business environments such as mobile healthcare (m-health), mobile commerce (m-commerce), mobile learning (m-learning) and mobile web services (m-WS). Mobile security assessment will be introduced in order to formulate appropriate security requirements. Key management protocols in typically ad hoc, wireless and location-dynamic environments will be presented and analysed. Emerging topics such as the Internet of Things (IoT), mobile clouds and distributed social network security will also be discussed. The module also provides hands-on practical exposure to apps development in location and context aware environments.

       
     

Network and Information Security with Management Studies MSc modules

  • This core module provides an overview of cryptography and various applications in information security, communication and computer science. This module deals with mathematical principles on which cryptography is based to include cryptographic algorithms, including practical examples of breaking codes. Additional techniques such as information hiding and secret sharing are progressively introduced. An introduction to advanced and emerging cryptographic techniques such as elliptic curve cryptography and quantum techniques.

    On successful completion of the module, students will be able to:

    • review concepts in computational number theory and their relevance for the design of secure and efficient techniques in cryptography;
    • describe and deploy common symmetric and asymmetric encryption algorithms used as standards in modern cryptosystems;
    • compare and contrast the properties of hash functions and attacks on them, and be familiar with their use in digital signature algorithms and their role in security protocols;
    • explain techniques for information hiding and secret sharing, and analyse their applications in security;
    • analyse cryptographic protocols for implementing a wide range of security requirements; and
    • critically discuss applications of cryptography including the latest and future trends.
     
  • The core module provides an overview of a wide range of security aspects and techniques of computer networks, both cabled and wireless. An introduction to basic aspects of information security progressing to cryptography. After studying fundamental concepts and algorithms, the topic of network security is introduced.

    On successful completion of the module, you will be able to:

    • critically discuss legal and ethical aspects of computer security;
    • compare and contrast data encryption algorithms suitable for encrypting, signing and protecting data and highlight their correct usages and significance in different security protocols;
    • analyse, model and evaluate the performance and security vulnerabilities, threats, risks and controls of cabled and wireless networks;
    • evaluate the role of firewalls, intrusion detection systems and vulnerability assessment tools in monitoring and securing a network, and analyse the protection provided by them;
    • discuss the statistical underpinnings of network traffic modelling including Erlang's theorems and queuing system in equilibrium; and
    • apply appropriate methodology to formulate the data, performance and security requirements of an organisation, to obtain potential solutions.
     
  • This core module provides a working knowledge of data communications covering TCP/IP networks and digital communications. Topics covered include transport layer services, multiplexing, TCP congestion control, network layer – network service models, IP addressing and IP network design, routing principles, dynamic routing, digital transmission, modulation, multiplexing and channel coding.

    On successful completion of the module, you will be able to:

    • Compare computer network architectures.
    • Evaluate the performance of TCP under varying flow control and congestion conditions.
    • Design an IP addressing scheme for a network.
    • Define and calculate transmission performance over a communication link.
    • Study and analyse characteristics of modulation methods.
     
  • This module runs on Saturdays.

    This module is aimed at the practical needs of students from different academic contexts such as, but not limited to computing, science, medicine, biotechnology and the health services who are aspiring team leaders, managers, and entrepreneurs in business within the context of the commercial, public, voluntary, or academic sector.

    The module introduces and uses activities and problem-solving to investigate business topics ranging from finance, accounting, budgeting, and marketing, to organisational management by developing the leadership skills to meet business challenges and cope with its complexity.

     
  • This module constitutes the major individual piece of work of the masters programme where you will carry out a project involving independent critical research, design and implementation (where applicable).

    On successful completion of the module, you will be able to:

    • Select, justify and use effectively the research methods and techniques appropriate for particular cases in order to carry out a literature search and an independent work of research.
    • Critically identify the need to position your research in the wider academic or business context and structure the dissertation format to agreed conventions.
    • Plan, manage and critically evaluate the project using the techniques and tools needed in order to bring it in successfully on time and within resourcing limits.
    • Identify and critically analyse real-world problems or knowledge gaps to which academic concepts and methods can be realistically applied to improve or resolve the problem situation.
    • Apply skills to show an ability to engage in academic and professional communication with others in their field through report and presentation.
    • Present critical awareness in applying appropriate legal, social or ethical obligations and when required, respond to the financial and other constraints of a corresponding business environment.
     

You will have the opportunity to study a foreign language, free of charge, during your time at the University as part of the Kingston Language Scheme. Options currently include: Arabic, French, German, Italian, Japanese, Mandarin, Portuguese, Russian and Spanish.

For further information:

Postgraduate admissions
Tel: +44 (0)20 8417 4546
Email us

Location

This course is taught at Penrhyn Road

View Penrhyn Road on our Google Maps

For further information:

Postgraduate admissions
Tel: +44 (0)20 8417 4546
Email us

Location

This course is taught at Penrhyn Road

View Penrhyn Road on our Google Maps
Favourite this course

Find a course

Course finder

>

Accreditation

The British Computer Society (BCS) accredits this course which means you may be able to gain exemptions from some BCS professional examinations.

Find out more...

Find us on Facebook

Postgraduate study
Site menu