Module 22456 (2013)

Module Description - Internet Security Seminar

The Module Description is a strict subset of the Syllabus Page, which gives more information

Module TitleInternet Security Seminar
SchoolComputer Science
Module Code06-22456
DescriptorCOMP/06-22456/LM
Member of StaffShishir Nagaraja:5, Flavio Garcia:5
LevelM
Credits10
Semester2
Pre-requisitesNone
Co-requisites06-23899 (Computer Security) and 06-20008 (Cryptography)
RestrictionsNone
Contact hours18-25
DeliverySupervision, student presentations
1. A list of papers is specified by the module provider (typically after receiving expressions of interest from the students). The module provider.
2. Each student prepares a (2-page) report and delivers a seminar on one the subject of one of the papers. The scope of the topic for examination purposes is defined by the module provider and the research papers, not by the content of the seminar.
3. The students read each paper in their own time. The presentation should introduce the material to the other students, however their primary understand of of the work should come from reading the papers.
4. Each week the module provider will set some written questions on the papers presented (possibly with input from the student presenting the particular papers). Typical questions might be along the lines of "This paper finds three faults in the VoIP protocol. Which is the most serious fault and why?" or "The checking method discribed in this paper is said to be complete but not sound. Describe a scenario in which the analysis may give the incorrect results. Is the analysis method useful in practice?".
Description The module consists of student-led presentations on current research in the field of computer security.
Outcomes
On successful completion of this module, the student should be able to:Assessed by:
give an in-depth explanation of a current research topic in Computer Security. Continuous Assessment (presentation and report)
make effective oral and written presentations to colleagues. Continuous Assessment (presentation and report)
understand and be able to discuss current research in a variety of topics in computer security, cryptography and related fields Continuous Assessment
AssessmentSessional: continuous assessment (presentation) (30%), continuous assessment (report) (30%), continuous assessment (40%)
Supplementary (where allowed): continuous assessment (presentation) (50%), continuous assessment (report) (50%), done over the summer.

TextsA list of research papers will be recommended at the start of the module.