The module provides learners with practical knowledge and skills to manage the various elements of the eCommerce Infrastructure, including electronic payments systems. It places particular focus on Information Systems security including: security threats, protection systems and business continuity planning as well as incorporating the constantly evolving cybersecurity environment that information systems are a critical part of.
Electronic retailing Infrastructure architecture design options.
Development techniques for infrastructure systems.
eCommerce Payment system
Online payment systems, Payment cards, Digital cash,
Digital wallets, Store value cards, Internet Technologies and the Banking industry
Payment systems threats
Malware, Denial of Service, Identify theft,
eCommerce security environment:- Scope of the problem, Security threats in the eCommerce environment
Protection technologies
Management policies, business procedures and public laws
Cybersecurity: including current and potential vulnerabilities (e.g. Ransomware, increased remote working, increasing use of cloud-based services, etc.) and protective measures and initiatives
Cryptography: Caesar Cipher, Vigenère Cipher, Block Ciphers including DES, 3DES, AES, Diffie-Hellman key exchange, RSA, Digital Signatures
Business Continuity planning:- Disaster recovery, security audit and risk management.
Software testing techniques.
Syllabus
Electronic retailing Infrastructure architecture design options. Development techniques for infrastructure systems. eCommerce Payment system Online payment systems, Payment cards, Digital cash, Digital wallets, Store value cards, Internet Technologies and the Banking industry Payment systems threats Malware, Denial of Service, Identify theft, eCommerce security environment:- Scope of the problem, Security threats in the eCommerce environment Protection technologies Management policies, business procedures and public laws Cybersecurity: including current and potential vulnerabilities (e.g. Ransomware, increased remote working, increasing use of cloud-based services, etc.) and protective measures and initiatives Cryptography: Caesar Cipher, Vigenère Cipher, Block Ciphers including DES, 3DES, AES, Diffie-Hellman key exchange, RSA, Digital Signatures Business Continuity planning:- Disaster recovery, security audit and risk management. Software testing techniques.
Lectures, labs, discussions and presentations
Module Content & Assessment | |
---|---|
Assessment Breakdown | % |
Formal Examination | 70 |
Other Assessment(s) | 30 |