Module 22456 (2012)

Syllabus page 2012/2013

06-22456
Internet Security Seminar

Level 4/M

Tom Chothia
10 credits in Semester 2

Links | Outline | Aims | Outcomes | Prerequisites | Teaching | Assessment | Books | Detailed Syllabus


The Module Description is a strict subset of this Syllabus Page. (The University module description has not yet been checked against the School's.)

Relevant Links

Module web page


Outline

The module consists of student-led presentations on current research in the field of computer security.


Aims

The aims of this module are to:

  • Provide students with the opportunity to study current research in depth
  • Train students in research skills and presention skills
  • Introduce a variety of topics in computer security, cryptography and related fields

Learning Outcomes

On successful completion of this module, the student should be able to: Assessed by:
1give an in-depth explanation of a current research topic in Computer Security. Presentation and report
2make effective oral and written presentations to colleagues. Presentation and report
3understand and be able to discuss current research in a variety of topics in computer security, cryptography and related fields Continuous assessment

Restrictions, Prerequisites and Corequisites

Restrictions:

None

Prerequisites:

None

Co-requisites:

06-23899 (Computer Security) and 06-20008 (Cryptography)


Teaching

Teaching Methods:

Supervision, student presentations
1. A list of papers is specified by the module provider (typically after receiving expressions of interest from the students). The module provider.
2. Each student prepares a (2-page) report and delivers a seminar on one the subject of one of the papers. The scope of the topic for examination purposes is defined by the module provider and the research papers, not by the content of the seminar.
3. The students read each paper in their own time. The presentation should introduce the material to the other students, however their primary understand of of the work should come from reading the papers.
4. Each week the module provider will set some written questions on the papers presented (possibly with input from the student presenting the particular papers). Typical questions might be along the lines of "This paper finds three faults in the VoIP protocol. Which is the most serious fault and why?" or "The checking method discribed in this paper is said to be complete but not sound. Describe a scenario in which the analysis may give the incorrect results. Is the analysis method useful in practice?".

Contact Hours:

18-25


Assessment

  • Sessional: Presentation (30%), report (30%), continuous assessment (40%)
  • Supplementary (where allowed): Presentation (50%), report (50%), done over the summer.

Recommended Books

TitleAuthor(s)Publisher, Date
AAA, A

Detailed Syllabus

Not applicable

Last updated: 25 Sep 2009

Source file: /internal/modules/COMSCI/2012/xml/22456.xml

Links | Outline | Aims | Outcomes | Prerequisites | Teaching | Assessment | Books | Detailed Syllabus