Module 26265 (2013)
Syllabus page 2013/2014
06-26265
Introduction to Computer Security
Level 2/I
Links | Outline | Aims | Outcomes | Prerequisites | Teaching | Assessment | Books | Detailed Syllabus
The Module Description is a strict subset of this Syllabus Page. (The University module description has not yet been checked against the School's.)
Relevant Links
Further information about this module can be found on the
module web page
.
Outline
The module will introduce a range of topics in computer security, including attacks, vulnerabilities and defences. Both theory and practice are covered.
Aims
The aims of this module are to:
- introduce the basic terminology, concepts, and standards of computer security
- familiarise students with the main approaches, algorithms, and protocols used to secure computer systems
- introduce the basic concepts of website and network security
- provide a basic knowledge of information security laws and regulations
Learning Outcomes
| On successful completion of this module, the student should be able to: | Assessed by: | |
| 1 | describe the basic concepts of computer security | Examination, Continuous Assessment |
| 2 | demonstrate an understanding of the threats to data stored on a computer, or being sent between computers, and apply techniques to secure that data | Examination, Continuous Assessment |
| 3 | identify security risks, and suggest appropriate solutions | Examination, Continuous Assessment |
Restrictions, Prerequisites and Corequisites
Restrictions:
None
Prerequisites:
None
Co-requisites:
None
Teaching
Teaching Methods:
Two one-hour lectures per week for eleven weeks. Plus eleven two-hour weekly lab sessions.
Contact Hours:
Assessment
- Sessional: 1.5 hr examination (80%), continuous assessment (20%).
- Supplementary (where allowed): By 1.5 hr examination only (100%).
Recommended Books
| Title | Author(s) | Publisher, Date |
| , | ||
| , | ||
| , |
Detailed Syllabus
-
Cryptography
- Symmetric Ciphers, Asymmetric Ciphers, Block cipher modes
- Encryption in Java
- Hash functions and password security
- Protocols
- The Diffie-Hellman protocol
- Key establishment protocols, and their aims
- Web security
- Common web attacks, SQL injection, XXS, CSRF
- Protecting websites from attack
- Application security
- Memory exploits and buffer overflows
- Software security
- Common Threats and Defences
- Malware, Botnets
- Firewall, and security tools
- Information Security Policy
- Standards e.g. PCI-DSS, ISO 27001
- Laws: e.g. The Computer Misuse Act, The Data Protection Act
Last updated: 9 July 2013
Source file: /internal/modules/COMSCI/2013/xml/26265.xml
Links | Outline | Aims | Outcomes | Prerequisites | Teaching | Assessment | Books | Detailed Syllabus