Module 23899 (2013)

Syllabus page 2013/2014

06-23899
Computer Security

Level 4/M

Tom Chothia
20 credits in Semester 1

Links | Outline | Aims | Outcomes | Prerequisites | Teaching | Assessment | Books | Detailed Syllabus


The Module Description is a strict subset of this Syllabus Page. (The University module description has not yet been checked against the School's.)

Relevant Links

Module Web Page


Outline

The module will introduce a range of topics in computer security, including attacks and vulnerabilities, and defenses and countermeasures. Both theory and practice are covered.


Aims

The aims of this module are to:

  • present the goals of data confidentiality, integrity and availability
  • introduce the principal methods and techniques involved in designing and implementing secure systems

Learning Outcomes

On successful completion of this module, the student should be able to: Assessed by:
1 describe the basic concepts of computer security Examination, Continuous Assessment
2 demonstrate an understanding of the threats to data stored on a computer, or being sent between computers, and apply techniques to secure that data Examination, Continuous Assessment
3 identify security risks, and suggest appropriate solutions Examination, Continuous Assessment

Restrictions, Prerequisites and Corequisites

Restrictions:

None

Prerequisites:

The ability to program in an object oriented language.

Co-requisites:

None


Teaching

Teaching Methods:

2hr/week lectures, 1hr/week tutorials and lab sessions

Contact Hours:

34


Assessment

  • Sessional: 1.5 hr examination (70%), continuous assessment (30%).
  • Supplementary (where allowed): 1.5 hr examination (100%)

Recommended Books

TitleAuthor(s)Publisher, Date
Computer SecurityDieter GollmannWiley, 2011
Security EngineeringRoss AndersonWiley, 2008

Detailed Syllabus

  1. Threats, risk, vulnerabilities and impact
  2. Fundamentals of cryptography
    • Symmetric-key encryption
    • Public-key encryption
    • Secure hash functions
  3. Cryptography in practice
    • Key certificates
    • Secure protocols
    • Anonymity
  4. Attacks and defenses
    • Exploits and security tools
    • Firewalls
    • Malware
    • Botnets

Last updated: 25 April 2012

Source file: /internal/modules/COMSCI/2013/xml/23899.xml

Links | Outline | Aims | Outcomes | Prerequisites | Teaching | Assessment | Books | Detailed Syllabus