Module 17417 (2009)

Syllabus page 2009/2010

06-17417
Computer Security

Level 4/M

Mark Ryan
10 credits in Semester 1

Links | Outline | Aims | Outcomes | Prerequisites | Teaching | Assessment | Books | Detailed Syllabus


The Module Description is a strict subset of this Syllabus Page. (The University module description has not yet been checked against the School's.)

Relevant Links

Module Web Page


Outline

The module will introduce a range of topics in computer security, including attacks and vulnerabilities, and defences and countermeasures. Both theory and practice are covered, through lectures and seminars.


Aims

The aims of this module are to:

  • present the goals of data confidentiality, integrity and availability
  • introduce the principal methods and techniques involved in designing and implementing secure systems

Learning Outcomes

On successful completion of this module, the student should be able to: Assessed by:
1 demonstrate understanding of a range of problems of computer security, and the available solutions and tradeoffs Examination
2 describe and apply secure methods for the transmission and storage of data Examination
3 describe and evaluate security applications and techniques described in the literature Examination

Restrictions, Prerequisites and Corequisites

Restrictions:

None

Prerequisites:

06-11224 (Introduction to Software Engineering), 06-15258 (Operating Systems) (or equivalents)
The module requires a basic knowledge of computer architecture, algorithms, logic and operating systems.

Co-requisites:

None


Teaching

Teaching Methods:

20 hrs of lectures and seminars.

Contact Hours:

15-20


Assessment

  • Sessional: 1.5 hr examination (100%).
  • Supplementary (where allowed): As the sessional assessment

Recommended Books

TitleAuthor(s)Publisher, Date
Web Security, Privacy and Commerce; Second editionS. Garfinkel and G. SpaffordO'Reilly, 2002
Security EngineeringR. AndersonWiley, 2001

Detailed Syllabus

  1. Threats, risk, vulnerabilities and impact
  2. Fundamentals of cryptography
    • Symmetric-key encryption
    • Public-key encryption
    • Secure hash functions
  3. Cryptography in practice
    • Key certificates
    • Secure protocols
  4. Attacks and defences
    • Viruses, spyware and Trojan horses
    • Phishing
    • Vulnerabilities of wireless networking
    • Intrusion detection
    • Denial-of-service attacks
  5. Applications of secure mechanisms
    • Trusted computing platforms
    • Digital cash
    • Steganography and digital watermarking
    • Language design

Last updated: 8 Oct 2006

Source file: /internal/modules/COMSCI/2009/xml/17417.xml

Links | Outline | Aims | Outcomes | Prerequisites | Teaching | Assessment | Books | Detailed Syllabus