Module 23899 (2011)
Syllabus page 2011/2012
06-23899
Computer Security
Level 4/M
Links | Outline | Aims | Outcomes | Prerequisites | Teaching | Assessment | Books | Detailed Syllabus
The Module Description is a strict subset of this Syllabus Page. (The University module description has not yet been checked against the School's.)
Relevant Links
Outline
The module will introduce a range of topics in computer security, including attacks and vulnerabilities, and defenses and countermeasures. Both theory and practice are covered.
Aims
The aims of this module are to:
- present the goals of data confidentiality, integrity and availability
- introduce the principal methods and techniques involved in designing and implementing secure systems
Learning Outcomes
| On successful completion of this module, the student should be able to: | Assessed by: | |
| 1 | describe the basic concepts of computer security | Examination, coursework |
| 2 | demonstrate an understanding of the threats to data stored on a computer, or being sent between computers, and apply techniques to secure that data | Examination, coursework |
| 3 | identify security risks, and suggest appropriate solutions | Examination, coursework |
Restrictions, Prerequisites and Corequisites
Restrictions:
None
Prerequisites:
None
Co-requisites:
None
Teaching
Teaching Methods:
2hr/week lectures, 1hr/week tutorials and lab sessions
Contact Hours:
Assessment
- Sessional: 1.5 hr examination (60%), coursework (40%).
- Supplementary (where allowed): 1.5 hr examination (100%)
Recommended Books
| Title | Author(s) | Publisher, Date |
| Cryptography and Network Security, Princples and Practice | William Stallings | Prentice Hall, 2006 |
| Security in Computing (4th ed.) | C Pfleeger & S Pfleeger | Prentice Hall, 2006 |
| Internet and Intranet Security | Rolf Oppliger | Artech House, 2002 |
Detailed Syllabus
- Threats, risk, vulnerabilities and impact
- Fundamentals of cryptography
- Symmetric-key encryption
- Public-key encryption
- Secure hash functions
- Cryptography in practice
- Key certificates
- Secure protocols
- Attacks and defenses
- Common exploits and security tools
- Firewalls
- Intrusion detection
- Denial-of-service attacks
- Privacy and Anonymity
- Methods used to track users
- Anonymity systems
Last updated: 25 March 2011
Source file: /internal/modules/COMSCI/2011/xml/23899.xml
Links | Outline | Aims | Outcomes | Prerequisites | Teaching | Assessment | Books | Detailed Syllabus