Module 23899 (2013)
Syllabus page 2013/2014
06-23899
Computer Security
Level 4/M
Links | Outline | Aims | Outcomes | Prerequisites | Teaching | Assessment | Books | Detailed Syllabus
The Module Description is a strict subset of this Syllabus Page. (The University module description has not yet been checked against the School's.)
Relevant Links
Outline
The module will introduce a range of topics in computer security, including attacks and vulnerabilities, and defenses and countermeasures. Both theory and practice are covered.
Aims
The aims of this module are to:
- present the goals of data confidentiality, integrity and availability
- introduce the principal methods and techniques involved in designing and implementing secure systems
Learning Outcomes
| On successful completion of this module, the student should be able to: | Assessed by: | |
| 1 | describe the basic concepts of computer security | Examination, Continuous Assessment |
| 2 | demonstrate an understanding of the threats to data stored on a computer, or being sent between computers, and apply techniques to secure that data | Examination, Continuous Assessment |
| 3 | identify security risks, and suggest appropriate solutions | Examination, Continuous Assessment |
Restrictions, Prerequisites and Corequisites
Restrictions:
None
Prerequisites:
The ability to program in an object oriented language.
Co-requisites:
None
Teaching
Teaching Methods:
2hr/week lectures, 1hr/week tutorials and lab sessions
Contact Hours:
Assessment
- Sessional: 1.5 hr examination (70%), continuous assessment (30%).
- Supplementary (where allowed): 1.5 hr examination (100%)
Recommended Books
| Title | Author(s) | Publisher, Date |
| Computer Security | Dieter Gollmann | Wiley, 2011 |
| Security Engineering | Ross Anderson | Wiley, 2008 |
Detailed Syllabus
- Threats, risk, vulnerabilities and impact
- Fundamentals of cryptography
- Symmetric-key encryption
- Public-key encryption
- Secure hash functions
- Cryptography in practice
- Key certificates
- Secure protocols
- Anonymity
- Attacks and defenses
- Exploits and security tools
- Firewalls
- Malware
- Botnets
Last updated: 25 April 2012
Source file: /internal/modules/COMSCI/2013/xml/23899.xml
Links | Outline | Aims | Outcomes | Prerequisites | Teaching | Assessment | Books | Detailed Syllabus