Module Overview

Cybersecurity in Retailing

The module provides learners with practical knowledge and skills to manage the various elements of the eCommerce Infrastructure, including electronic payments systems. It places particular focus on Information Systems security including: security threats, protection systems and business continuity planning as well as incorporating the constantly evolving cybersecurity environment that information systems are a critical part of. 

Module Code

RETL4022

ECTS Credits

10

*Curricular information is subject to change

Electronic retailing Infrastructure architecture design options.

Development techniques for infrastructure systems.

eCommerce Payment system

Online payment systems, Payment cards, Digital cash,

Digital wallets, Store value cards, Internet Technologies and the Banking industry

Payment systems threats

Malware, Denial of Service, Identify theft,

eCommerce security environment:- Scope of the problem, Security threats in the eCommerce environment

Protection technologies

Management policies, business procedures and public laws

Cybersecurity: including current and potential vulnerabilities (e.g. Ransomware, increased remote working, increasing use of cloud-based services, etc.) and protective measures and initiatives

Cryptography: Caesar Cipher, Vigenère Cipher, Block Ciphers including DES, 3DES, AES, Diffie-Hellman key exchange, RSA, Digital Signatures

Business Continuity planning:- Disaster recovery, security audit and risk management.

Software testing techniques.

Syllabus

Electronic retailing Infrastructure architecture design options. Development techniques for infrastructure systems. eCommerce Payment system Online payment systems, Payment cards, Digital cash, Digital wallets, Store value cards, Internet Technologies and the Banking industry Payment systems threats Malware, Denial of Service, Identify theft, eCommerce security environment:- Scope of the problem, Security threats in the eCommerce environment Protection technologies Management policies, business procedures and public laws Cybersecurity: including current and potential vulnerabilities (e.g. Ransomware, increased remote working, increasing use of cloud-based services, etc.) and protective measures and initiatives Cryptography: Caesar Cipher, Vigenère Cipher, Block Ciphers including DES, 3DES, AES, Diffie-Hellman key exchange, RSA, Digital Signatures Business Continuity planning:- Disaster recovery, security audit and risk management. Software testing techniques.

Lectures, labs, discussions and presentations

Module Content & Assessment
Assessment Breakdown %
Formal Examination70
Other Assessment(s)30