Module 22456 (2013)
Syllabus page 2013/2014
06-22456
Internet Security Seminar
Level 4/M
Flavio Garcia:5
Links | Outline | Aims | Outcomes | Prerequisites | Teaching | Assessment | Books | Detailed Syllabus
The Module Description is a strict subset of this Syllabus Page. (The University module description has not yet been checked against the School's.)
Relevant Links
Outline
The module consists of student-led presentations on current research in the field of computer security.
Aims
The aims of this module are to:
- Provide students with the opportunity to study current research in depth
- Train students in research skills and presention skills
- Introduce a variety of topics in computer security, cryptography and related fields
Learning Outcomes
| On successful completion of this module, the student should be able to: | Assessed by: | |
| 1 | give an in-depth explanation of a current research topic in Computer Security. | Continuous Assessment (presentation and report) |
| 2 | make effective oral and written presentations to colleagues. | Continuous Assessment (presentation and report) |
| 3 | understand and be able to discuss current research in a variety of topics in computer security, cryptography and related fields | Continuous Assessment |
Restrictions, Prerequisites and Corequisites
Restrictions:
None
Prerequisites:
None
Co-requisites:
06-23899 (Computer Security) and 06-20008 (Cryptography)
Teaching
Teaching Methods:
Supervision, student presentations
1. A list of papers is specified by the module provider (typically after receiving expressions of interest from the students). The module
provider.
2. Each student prepares a (2-page) report and delivers a seminar on one the subject of one of the papers. The scope of the topic for
examination purposes is defined by the module provider and the research papers, not by the content of the seminar.
3. The students read each paper in their own time. The presentation should introduce the material to the other students, however their
primary understand of of the work should come from reading the papers.
4. Each week the module provider will set some written questions on the papers presented (possibly with input from the student presenting
the particular papers). Typical questions might be along the lines of "This paper finds three faults in the VoIP protocol. Which is the most
serious fault and why?" or "The checking method discribed in this paper is said to be complete but not sound. Describe a scenario in which
the analysis may give the incorrect results. Is the analysis method useful in practice?".
Contact Hours:
Assessment
- Sessional: continuous assessment (presentation) (30%), continuous assessment (report) (30%), continuous assessment (40%)
- Supplementary (where allowed): continuous assessment (presentation) (50%), continuous assessment (report) (50%), done over the summer.
Recommended Books
| Title | Author(s) | Publisher, Date |
| A | A | A, A |
Detailed Syllabus
Not applicable
Last updated: 25 Sep 2009
Source file: /internal/modules/COMSCI/2013/xml/22456.xml
Links | Outline | Aims | Outcomes | Prerequisites | Teaching | Assessment | Books | Detailed Syllabus