Network and Computer Security - 2019 entry
MODULE TITLE | Network and Computer Security | CREDIT VALUE | 15 |
---|---|---|---|
MODULE CODE | ECM2426 | MODULE CONVENER | Prof Achim D. Brucker (Coordinator) |
DURATION: TERM | 1 | 2 | 3 |
---|---|---|---|
DURATION: WEEKS | 11 | 0 | 0 |
Number of Students Taking Module (anticipated) | 90 |
---|
Network and computer security is now widely recognized as a vital aspect in the design, development, and implementation of today’s computer systems. Billions have been spent on strengthening the security of computer systems to defend against hacking, malicious code, data theft, denial-of-service attacks, etc. This module will provide a solid understanding of the main issues related to security in modern computer systems and networks. You will learn the foundations of computer security, techniques to secure complex systems, and gain practical skills in assessing the threats to the security of networked computer systems.
Pre-requisite ECM1417
This module aims to create awareness of the need for security and introduce security mechanisms in modern computer systems. We will explore topics such as fundamentals of computer security, technology and principles of network security, cryptography, authentication and digital signatures, access control mechanisms and software security. The module gives you practical hands-on experience of testing security applications, applying security methods, and protecting networked systems.
On successful completion of this module you should be able to:
Module Specific Skills and Knowledge:
1. Demonstrate understanding of the concepts, issues, and theories of cryptography and security;
2. Demonstrate theoretical and practical knowledge of security technologies, tools, and services;
3. Gain practical experience of developing solutions to networks and computer security challenges.
Discipline Specific Skills and Knowledge:
4. Show an awareness of the need for network and computer security;
5. Demonstrate good design and development skills.
Personal and Key Transferable / Employment Skills and Knowledge:
6. Demonstrate practical knowledge of current security methods and tools.
Security Fundamentals and Access Control:
- Integrity, Reliability, Availability;
- Authentication & Identification;
- Access Control Models.
Introduction into Cryptography:
- Symmetric and asymmetric encryption;
- Attacking enryption*;
- Signatures.
Security Protocols:
- Authentic and secure communication;
- Formal modelling of security protocols;
- Formal analysis of security protocols.
Software Security:
- Software vulnerabilities;
- Secure software development;
- Security testing.
Scheduled Learning & Teaching Activities | 72 | Guided Independent Study | 78 | Placement / Study Abroad | 0 |
---|
Category | Hours of study time | Description |
Scheduled learning & Teaching activities | 22 | Lectures |
Scheduled learning & Teaching activities | 50 | Workshops/tutorials |
Guided independent study | 50 | Individual assessed work |
Guided independent study | 28 | Guided Independent study |
Form of Assessment | Size of Assessment (e.g. duration/length) | ILOs Assessed | Feedback Method |
---|---|---|---|
Laboratory exercises | 10 x 15 minutes | All | Oral and Written |
Coursework | 30 | Written Exams | 70 | Practical Exams | 0 |
---|
Form of Assessment | % of Credit | Size of Assessment (e.g. duration/length) | ILOs Assessed | Feedback Method |
---|---|---|---|---|
Written exam - closed book | 70 | 2 hours Winter Examination | 1,2,4,5 | Oral on request |
Coursework - Foundations and Crypto | 15 | 25 hours | 1,2 | Written |
Security protocols and software security | 15 | 25 hours | 1,2,3,4,5 | Written |
Original Form of Assessment | Form of Re-assessment | ILOs Re-assessed | Time Scale for Re-assessment |
---|---|---|---|
Written exam - closed book | Written exam- closed book (70%) | All | August Ref/Def Period |
Coursework – practical security assignments | Coursework – practical security assignments (30%) | All | Completed over summer with a deadline in August |
Students may be referred/deferred in the written exam, the coursework, or both, depending on their performance in the original assessment or the reasons for referral/deferral.
information that you are expected to consult. Further guidance will be provided by the Module Convener
Basic reading:
ELE: http://vle.exeter.ac.uk/
Web based and Electronic Resources:
Other Resources:
Reading list for this module:
Type | Author | Title | Edition | Publisher | Year | ISBN |
---|---|---|---|---|---|---|
Set | R.J. Anderson | Security Engineering: A Guide to Building Dependable Distributed Systems | 1st | John Wiley | 2001 | 0471389226 |
Set | A.J.Menezes, S.A. Vanstone and P.C.V. Oorschot | Handbook of Applied Cryptography | 5th | CRC Press | 2001 | 0849385237 |
Set | Pfleeger, C. P., Pfleeger, S. L., Margulies, J | Security in Computing | 5th | Prentice Hall | 2015 | 978-0-13-408504-3 |
Set | William Stallings | Cryptography and Network Security: Principles and Practice | 2013 | |||
Set | N. Daswani, C. Kern and A. Kesavan | Foundations of Security: What Every Programmer Needs to Know | Apress | 2007 | ||
Set | M. Howard, D. LeBlanc and J. Viega | 24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them | 1st | McGraw Hill | 2010 | |
Set | B. Chess and J. West | Secure Programming with Static Analysis | 1st | Addison Wesley | 2007 | |
Set | D. Stuttard and M. Pinto | The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws | O'Reilly | 2011 | ||
Set | Michael T. Goodrich and Roberto Tamassia | Introduction to Computer Security | Addison Wesley | 2011 | 0-32-151294-4 | |
Set | John R. Vacca | Computer and Information Security Handbook | 2nd | 2013 | ||
Set | William Stallings, Lawrie Brown | Computer Security: Principles and Practice | 3rd | 2014 |
CREDIT VALUE | 15 | ECTS VALUE | 7.5 |
---|---|---|---|
PRE-REQUISITE MODULES | ECM1417 |
---|---|
CO-REQUISITE MODULES |
NQF LEVEL (FHEQ) | 6 | AVAILABLE AS DISTANCE LEARNING | No |
---|---|---|---|
ORIGIN DATE | Tuesday 10th July 2018 | LAST REVISION DATE | Tuesday 2nd July 2019 |
KEY WORDS SEARCH | Network; computer security. |
---|
Please note that all modules are subject to change, please get in touch if you have any questions about this module.