Module 17417 (2005)

Syllabus page 2005/2006

06-17417
Computer Security

Level 4/M

Mark Ryan
10 credits in Semester 1

Links | Outline | Aims | Outcomes | Prerequisites | Teaching | Assessment | Books | Detailed Syllabus


The Module Description is a strict subset of this Syllabus Page. (The University module description has not yet been checked against the School's.)

Relevant Links

Module Web Page


Outline

The module will introduce a range of topics in computer security, including attacks and vulnerabilities, and defences and countermeasures. Both theory and practice are covered, through lectures and seminars.


Aims

The aims of this module are to:

  • present the goals of data confidentiality, integrity and availability
  • introduce the principal methods and techniques involved in designing and implementing secure systems

Learning Outcomes

On successful completion of this module, the student should be able to: Assessed by:
1 demonstrate understanding of a range of problems of computer security, and the available solutions and tradeoffs Examination
2 describe and apply secure methods for the transmission and storage of data Examination
3 describe and evaluate security applications and techniques described in the literature Examination

Restrictions, Prerequisites and Corequisites

Restrictions:

None

Prerequisites:

06-11224 (Introduction to Software Engineering), 06-15258 (Operating Systems) (or equivalents)
The module requires a basic knowledge of computer architecture, algorithms, logic and operating systems.

Co-requisites:

None


Teaching

Teaching Methods:

20 hrs of lectures and seminars.

Contact Hours:

15-20


Assessment

  • Supplementary (where allowed): As the sessional assessment
  • 1.5 hr examination (100%).

Recommended Books

TitleAuthor(s)Publisher, Date
Applied Cryptography, Second EditionBruce SchnierWiley, 1996
Web Security, Privacy and Commerce; Second editionS. Garfinkel and G. SpaffordO'Reilly, 2002
Cryptography and Network Security, Principles and Practice (3rd Edition)William StallingsPrentice Hall, 2003
Secure Communicating Systems: Design, Analysis and ImplementationMichael HuthCambridge University Press, 2001

Detailed Syllabus

  1. Threats, risk, vulnerabilities and impact
  2. Fundamentals of cryptography
    • Symmetric-key encryption
    • Public-key encryption
    • Secure hash functions
  3. Cryptography in practice
    • Key certificates
    • Secure protocols
  4. Attacks and defences
    • Viruses, spyware and Trojan horses
    • Phishing
    • Vulnerabilities of wireless networking
    • Intrusion detection
    • Denial-of-service attacks
  5. Applications of secure mechanisms
    • Trusted computing platforms
    • Digital cash
    • Steganography and digital watermarking
    • Language design

Last updated: 5 Jun 2005

Source file: /internal/modules/COMSCI/2005/xml/17417.xml

Links | Outline | Aims | Outcomes | Prerequisites | Teaching | Assessment | Books | Detailed Syllabus