Files
hpr-knowledge-base/hpr_transcripts/hpr4164.txt
Lee Hanken 7c8efd2228 Initial commit: HPR Knowledge Base MCP Server
- MCP server with stdio transport for local use
- Search episodes, transcripts, hosts, and series
- 4,511 episodes with metadata and transcripts
- Data loader with in-memory JSON storage

🤖 Generated with [Claude Code](https://claude.com/claude-code)

Co-Authored-By: Claude <noreply@anthropic.com>
2025-10-26 10:54:13 +00:00

172 lines
12 KiB
Plaintext

Episode: 4164
Title: HPR4164: Postgraduate Computing
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr4164/hpr4164.mp3
Transcribed: 2025-10-25 20:36:08
---
This is Hacker Public Radio Episode 4164 for Thursday the 18th of July 2024.
Today's show is entitled POSP Graduate Computing.
It is hosted by Lee and is about 11 minutes long.
It carries a clean flag.
The summary is studying for a Master's in Computing with the Open University.
My name is Lee and today I'll talk about a postgraduate Master's in Computing which
I've been studying towards over the last few years.
This qualification could be studied for with quite a few different universities in the
United Kingdom.
I'll be talking about the programme that's offered by the Open University and focusing
on the particular modules that I've taken myself.
While the modules I took did not have specific entry requirements, I noted the recommendation
that students weaver have previously studied the graduate level or have an equivalent
level of industry experience.
I studied one module at a time with each one recommending about 10 hours study per week.
Just a little about the institution itself.
While there is a campus in the city of Milton Keynes in Buckinghamshire, England, unlike
my stuffy universities, this university has always been primarily for distant study
long before the days of the internet, covid and video calls.
Daniel Weinbrunt describes in his book The Open University History how the then-primince
to Harold Wilson in 1963 set out plans for a University of the Air which was eventually
realised and gained a royal charter in 1969.
I remember as a child in the 1980s and 1990s watching the television broadcasts they put
out on the BBC in the early hours of the morning which supplemented the other study material
students were sent in the post.
A decade or so ago my mother, who in her youth after passing the 11-plus selection exam
yet not being able to go to a grammar school and having left school with only a handful
of O level qualifications, studied for and obtained a Bachelor of Arts degree in her retirement
through the Open University.
While studying by correspondence can feel quite solitary on each of the modules there
was a form of students and some of the modules also had collaborative activities.
The first module of the Master's Eye studied was information security.
Studying this it helps if it can be related to an actual organisation the student has
some first-hand knowledge of and that was pretty much a requirement for the assignments
which sent it around developing a hypothetical information security management system that
would suit the organisation in question.
The first lesson was that security is not static but a moving target and for an organisation
to be secure its processes must evolve over time.
The International Standard ISO 27000 outlines the various things that an information security
management system should include.
We were taught how to categorise and prioritise critical information assets to think about
the need to incorporate security within company policies with designated roles and people
with accountability.
Different types and levels of risk need to be treated appropriately, applying whatever
controls are necessary and there should be ways of ensuring compliance.
One way of looking at information risk is to list the asset, the access, the actor, the
motive and the outcome.
So an asset might be identity documents such as a scanned passport, the access might be
physical access to the computer with the files or instead via the network, the actor who
might compromise security could be inside such as an employee or outside such as a hacker.
The motive or circumstance for these files to be accessed could be either deliberate
or accidental and finally the likely outcomes might be disclosure of sensitive information
or loss or destruction of that information.
There are different ways of quantifying risk, but in its most simple form it involves multiplying
the probability of the event happening by some measure of the impact if it did happen
and this might be in monetary or other terms.
As well as the broad concepts mentioned we also looked at some specific information security
tools.
One of these was Nessus available from tenable.com which scans a PC for vulnerabilities
and lists these with a score of critical high medium low or for info only.
Compliance is an area I was already familiar with from having to get a client's web server
to pass quarterly scans because it processes cardholder details.
The module concluded within assignment requiring some independent research into a chosen security
topic.
I chose Halipots which a device is that detect intrusion onto a network by making themselves
deliberately visible and easy to hack and two of the three papers are reviewed for this
assignment were about using Raspberry Pi's as Halipots.
Just one note about this level of study which I discovered to my disadvantage in completing
the assignment is that students are expected to make use of specific academic skills and
present findings in an expected format and if this is not adhered to closely it does
not matter how technically good the work is it won't get high marks.
The next module was system security this one I felt right at home with because it had
a fairly technical bias.
I also enjoyed it because a lot of the activities were collaborative presenting system models
to others and reviewing Ness.
The material studied was quite diverse including different types of cryptography and access controls
using the CVE security vulnerability database hardening a Linux installation modeling systems
with data flow and activity diagrams and the application of ethics with respect to governments
weaponizing security exploits.
The key learning of the module is that any security threat relates to one or more of the
following first spoofing that is pretending to be not who or what someone seems second
tampering that is changing data thirdly repudiation that is doing something then saying that
it didn't happen.
For free information disclosure are leaking some data then fifth denial of service so stopping
system from working and finally sixth elevation of privilege that is using some limited access
to wrongfully gain more access.
These form the acronym STRIGHT which is attributed to confelda and garg in 1999.
System security was my favourite module and I scored a distinction for it and while I did
subsequently fail miserably to describe how to secure a modern web based system we're
asked as part of an interview for a job working for the bridge government answering a similar
question on reddit we're not under interview pressure attracted well over 100 upvotes.
The third module was network security and this was heavily biased towards Cisco with capital
C and there was a lot of work typing commands into virtual iOS devices that is iOS in all
capitals as in internet work operating system are not the little wide bigger OS made by Apple.
Apart from mundane stuff like doing networking things at different layers of the OSI model
implementing access controls and Cisco devices network routing and the somewhat complicated
task of setting up a VPN.
The module also covered how companies secure devices like mobile phones and laptops when
employees bring their own stuff into a company network.
The final assignment included a neat task in Carly Linux forensically examining the results
of a pretend exploit using tools like Wyshark to make sense of the logs and then document
what had happened and how.
The next module was software development here I got my hands dirty with the monstrosity
that is an enterprise Java database application with a web based interface at an API endpoint
and they still have scars from dependency resolution and configuration of database drivers.
The module mainly covered object or programming and especially the drawing of class diagrams
the concept of design patterns and using a test framework.
Out of some sense of rebelliousness that the aforementioned are front to my sanity I
blatantly used one of the assignments as an excuse to learn both Spring Boot and Angular
even though neither of those was mandated in the assignment brief.
The module ended with a research and review assignment of papers on a chosen topic and
I chose a topic of security and open source software.
In the context of using automated tools rather than code review to detect security issues
in code I even managed to sneak in a reference to chest legend Gary Casper of famously beaten
by Deep Blue about what computers are good at and what they are not.
Although had it been a year later advances in large language models might have nullified
this point.
The most recent module I studied was software engineering.
While covering several topics such as software quality, productivity, the place of open source,
the agile methodology and again ethics, the primary topic was requirements engineering.
The main message is you can't make a sandwich until you know the preferences and dietary
requirements of your client.
The likely costs of tools and materials such as a knife, cheese and butter, the likely
time it will take, the consequences if you could only get as far as buttering the bread
and needed to call in a cheese specialist to complete the job and the need for these requirements
to be signed off with all stakeholders involved, especially the client's mum.
For anyone facing such dilemmas the set text was mastering the requirements process by
Robertson and Robertson.
The main case study on this module centered around a fictional ticketing system for the
Olympics this year.
The collaborative activity involved collaborating with dozen or so other students on a GitHub
repository hosting requirements documents for this system.
With every single person having full read and write access this did get a bit chaotic
and some of the blame for that rest of my shoulders, as are more than once used features of
Git that weren't taught in the module and aren't generally sanctioned such as rebasing
then force pushing to a shared repo.
Unlike the other modules this one ended with an exam, this was open book but required
application of principles taught in the course to a newly presented case study.
The final module not yet taken is called Research and Context.
I plan to study this later this year.
It will be about the process of academic research and primarily involves conducting some
research on a chosen topic.
I have that to look forward to.
So today I've talked about several postgraduate modules offered by the Open University that
can be combined into a master's qualification.
Other universities were other modules and there were some I could have taken but opted
not to such as data management and digital forensics.
This route of study is not for everyone, they're financial and time pressures.
Some of what is learned may be abstract or literally only of academic use rather than
of direct vocational relevance.
Maybe qualification is not important to everyone and there are arguably now more varied
avenues for carrying out substantial learning than they were in the past that do not include
the university.
However, there are good reasons why some people do benefit from studying in this way.
Many have and perhaps more would give the opportunity.
In any case I hope this has been of interest and thanks for listening.
You have been listening to Hacker Public Radio at Hacker Public Radio does work.
Today's show was contributed by a HBR listener like yourself.
If you ever thought of recording podcast, click on our contribute link to find out how
easy it really is.
Hosting for HBR has been kindly provided by an honesthost.com, the internet archive and
our syncs.net.
On the Sadois status, today's show is released under Creative Commons, Attribution 4.0 International
License.