Module 23900 (2011)
Syllabus page 2011/2012
06-23900
Network Security
Level 4/M
Links | Outline | Aims | Outcomes | Prerequisites | Teaching | Assessment | Books | Detailed Syllabus
The Module Description is a strict subset of this Syllabus Page. (The University module description has not yet been checked against the School's.)
Relevant Links
Outline
The module introduces the threats and attacks which may be perpetrated on computer networks, and some of the mechanisms designed to address them. Some technology case studies are presented and evaluated.
Aims
The aims of this module are to:
- introduce the basic terminology, concepts, and mechanisms of network security
- explain network threats, vulnerabilities, and attacks
- present security algorithms and protocols as countermeasures
Learning Outcomes
| On successful completion of this module, the student should be able to: | Assessed by: | |
| 1 | explain network vulnerabilities and attacks | Examination, Coursework |
| 2 | explain and evaluate security mechanisms designed to address such attacks | Examination, Coursework |
| 3 | design networking security solutions appropriate for a given application and situation | Examination, Coursework |
Restrictions, Prerequisites and Corequisites
Restrictions:
None
Prerequisites:
No formal prerequisites but good working knowledge in at least one programming language and good knowledge of basic networking techniques (TCP/IP) are required.
Co-requisites:
None.
Teaching
Teaching Methods:
2hr/week lectures, 1hr/week tutorials and lab sessions
Contact Hours:
Assessment
- Sessional: 1.5 hr examination (60%), coursework (40%).
- Supplementary (where allowed): 1.5 hr examination (100%).
- The continuous assessment will consist of a report.
Recommended Books
| Title | Author(s) | Publisher, Date |
| Cryptography and Network Security, Principles and Practice (4th ed.) | William Stallings | Prentice Hall, 2006 |
| Security in Computing (4th ed.) | C Pfleeger & S Pfleeger | Prentice Hall, 2006 |
| Internet and Intranet Security (2nd ed.) | Rolf Oppliger | Artech House, 2002 |
Detailed Syllabus
- TCP/IP-protocol
- Spoofing
- Hijacking
- Firewalls
- Anonymous Communications
- Intrusion Detection
- Malware
Last updated: 4 April 2012
Source file: /internal/modules/COMSCI/2011/xml/23900.xml
Links | Outline | Aims | Outcomes | Prerequisites | Teaching | Assessment | Books | Detailed Syllabus