Module 23900 (2011)

Syllabus page 2011/2012

06-23900
Network Security

Level 4/M

Eike Ritter
20 credits in Semester 2

Links | Outline | Aims | Outcomes | Prerequisites | Teaching | Assessment | Books | Detailed Syllabus


The Module Description is a strict subset of this Syllabus Page. (The University module description has not yet been checked against the School's.)

Relevant Links

Module Web Page


Outline

The module introduces the threats and attacks which may be perpetrated on computer networks, and some of the mechanisms designed to address them. Some technology case studies are presented and evaluated.


Aims

The aims of this module are to:

  • introduce the basic terminology, concepts, and mechanisms of network security
  • explain network threats, vulnerabilities, and attacks
  • present security algorithms and protocols as countermeasures

Learning Outcomes

On successful completion of this module, the student should be able to: Assessed by:
1explain network vulnerabilities and attacks Examination, Coursework
2explain and evaluate security mechanisms designed to address such attacks Examination, Coursework
3design networking security solutions appropriate for a given application and situation Examination, Coursework

Restrictions, Prerequisites and Corequisites

Restrictions:

None

Prerequisites:

No formal prerequisites but good working knowledge in at least one programming language and good knowledge of basic networking techniques (TCP/IP) are required.

Co-requisites:

None.


Teaching

Teaching Methods:

2hr/week lectures, 1hr/week tutorials and lab sessions

Contact Hours:

35


Assessment

  • Sessional: 1.5 hr examination (60%), coursework (40%).
  • Supplementary (where allowed): 1.5 hr examination (100%).
  • The continuous assessment will consist of a report.

Recommended Books

TitleAuthor(s)Publisher, Date
Cryptography and Network Security, Principles and Practice (4th ed.)William StallingsPrentice Hall, 2006
Security in Computing (4th ed.) C Pfleeger & S PfleegerPrentice Hall, 2006
Internet and Intranet Security (2nd ed.)Rolf OppligerArtech House, 2002

Detailed Syllabus

  1. TCP/IP-protocol
  2. Spoofing
  3. Hijacking
  4. Firewalls
  5. Anonymous Communications
  6. Intrusion Detection
  7. Malware

Last updated: 4 April 2012

Source file: /internal/modules/COMSCI/2011/xml/23900.xml

Links | Outline | Aims | Outcomes | Prerequisites | Teaching | Assessment | Books | Detailed Syllabus