The University of Limerick’s MEng Information and Network Security is an exciting Masters option for anyone who wants to purse a career in ICT.
Why study the MEng Information and Network Security?
One of the foremost considerations facing businesses and organisations today is the security of network and information systems. Networks and information systems transfer and support of data all over the globe. Therefore, security is a persistent issue.
Information is sensitive. This is particularly true in banking, e-commerce and telecommunications as well as defence. A small lapse in security can result in a catastrophe.
The MEng Information and Network Security covers key areas of security of Information and Communications Technology (ICT) systems. Topic covered include:
- Cryptography and Security Fundamentals
- Data Forensics
- Multimedia Communications
- Biometrics
- Communication and Security Protocols
Fundamental concepts of information and network security
Access Control
Controls the users with access to the network. Every user in a system should have a recognisable identification.
Application Security
Most organisations build their applications themselves or buy them. Either way, an application running on an organisations database and network may be a doorway to malicious access and insecurity. Therefore, application security looks at methods of avoiding infiltration of a network.
Data Loss Prevention
Data Loss and Prevention ensures that users do not share information that is sensitive to unauthorised users. It also analyses the way people upload, download, forward, stores and delete data from an information or network system.
Behavioural Analytics
Every network has behavioural characteristics. These can be studied and analysed. Consequently, if an information or network system behaves abnormally, this must be addressed promptly.
Mobile Device Security
Smartphones now perform many of the same tasks of computers. As a result, they are one of the newer threats to security.
Wireless Security
Wireless networks can be more complicated to secure. Because of this, there has been plenty of research into secure ways to use wireless technology.
Comments