Course Brief

This course will provide security professionals with an understanding of the legal and ethical issues surrounding current day systems as they relate to cyber security and cyber crime.


  1. To appreciate the issues relating to aspects of British Law for the collection of computer forensics evidence and presentation of the evidence in court.

  2. Identify the ethical issues related to ethical hacking and to undertaking forensics investigations.

  3. Identify the relevant laws which apply to the security of information systems.

Introduction to Information Technology Law

The nature of cybercrime and cybercriminals. Case studies: computer misuse, hacking, viruses, criminal damage and mail-bombing’ pornography and obscenity.

Crime and law enforcement: fraud and identity theft; grooming, harassment, and cyberstalking; the Convention on Cybercrime.  Legal issues: Regulation of Investigatory Powers Act, E-commerce.

Digitisation and society (social networking, e-health, data collection etc.).

Legal issues : Computer Misuse Act, forensic data, Police & Criminal Evidence Act.

The laws, rules, regulations, rights and controls for recovering and preserving data and equipment.
Data Protection. Identify ethical and legal issues in cyberspace.

Cyber-forensics and criminal procedure (pre-trial disclosure, abuse of process, admissibility, expert witnesses, court presentation).

  • MSc Operational Cyber Security

    Students on the MSc Operational Cyber Security will learn a wide range of practical and theoretical skills. Students will develop a sound knowledge of cyber security and its application in real life situations, while extending their abilities to analyse and solve problems. 

    Applications would be welcomed from students with any numerate degree from a science background, a Law or a business degree. Mature applicants who demonstrate academic potential can also be assessed for eligibility.

     

    The programme provides opportunities for students to achieve a knowledge and understanding of:

    • Modern methods and techniques for cyber security, including penetration testing and IT auditing.
    • Basic concepts of networking, developing web applications, cyber security and risk management.
    • Techniques in cyber security, cyber physical security and forensics investigations.
    • The modern computing environment and software tools for a cyber security professional.
    • Specialised advanced topics in the area of security and its applications.
    • Research tools and techniques appropriate to the cyber security domain.