Module 23899 (2011)

Syllabus page 2011/2012

06-23899
Computer Security

Level 4/M

Tom Chothia
20 credits in Semester 1

Links | Outline | Aims | Outcomes | Prerequisites | Teaching | Assessment | Books | Detailed Syllabus


The Module Description is a strict subset of this Syllabus Page. (The University module description has not yet been checked against the School's.)

Relevant Links

Module Web Page


Outline

The module will introduce a range of topics in computer security, including attacks and vulnerabilities, and defenses and countermeasures. Both theory and practice are covered.


Aims

The aims of this module are to:

  • present the goals of data confidentiality, integrity and availability
  • introduce the principal methods and techniques involved in designing and implementing secure systems

Learning Outcomes

On successful completion of this module, the student should be able to: Assessed by:
1 describe the basic concepts of computer security Examination, coursework
2 demonstrate an understanding of the threats to data stored on a computer, or being sent between computers, and apply techniques to secure that data Examination, coursework
3 identify security risks, and suggest appropriate solutions Examination, coursework

Restrictions, Prerequisites and Corequisites

Restrictions:

None

Prerequisites:

None

Co-requisites:

None


Teaching

Teaching Methods:

2hr/week lectures, 1hr/week tutorials and lab sessions

Contact Hours:

35


Assessment

  • Sessional: 1.5 hr examination (60%), coursework (40%).
  • Supplementary (where allowed): 1.5 hr examination (100%)

Recommended Books

TitleAuthor(s)Publisher, Date
Cryptography and Network Security, Princples and PracticeWilliam StallingsPrentice Hall, 2006
Security in Computing (4th ed.)C Pfleeger & S PfleegerPrentice Hall, 2006
Internet and Intranet SecurityRolf OppligerArtech House, 2002

Detailed Syllabus

  1. Threats, risk, vulnerabilities and impact
  2. Fundamentals of cryptography
    • Symmetric-key encryption
    • Public-key encryption
    • Secure hash functions
  3. Cryptography in practice
    • Key certificates
    • Secure protocols
  4. Attacks and defenses
    • Common exploits and security tools
    • Firewalls
    • Intrusion detection
    • Denial-of-service attacks
  5. Privacy and Anonymity
    • Methods used to track users
    • Anonymity systems

Last updated: 25 March 2011

Source file: /internal/modules/COMSCI/2011/xml/23899.xml

Links | Outline | Aims | Outcomes | Prerequisites | Teaching | Assessment | Books | Detailed Syllabus