Skip to main content

Study information

Fundamentals of Security - 2024 entry

MODULE TITLEFundamentals of Security CREDIT VALUE15
MODULE CODEECMM462 MODULE CONVENERDr Saif Alzubi (Coordinator)
DURATION: TERM 1 2 3
DURATION: WEEKS 11
Number of Students Taking Module (anticipated) 45
DESCRIPTION - summary of the module content
Our modern life depends on the security of computerised systems ranging from social aspects (e.g. phishing) to technical and mathematical aspects (e.g. access control, encryption). In this module, you will learn the fundamental concepts required for starting a career in various areas related to security (e.g. cyber security, data security, information security, computer security). You will learn core security concepts (e.g. authenticity, confidentiality, anonymity, privacy) and core technologies (e.g. encryption, authentication, authorisation). Moreover, you will learn the basic attacks on security systems and approaches for reasoning about the correctness of security techniques.
 
Pre-requisites: None 
Co-requisites: None
AIMS - intentions of the module
The aim of this module to create awareness of the need for security and privacy in modern life, and to introduce the fundamental security and privacy mechanism used in modern computer systems. We will explore topics such as fundamentals of computer security, technology and principles of network security, cryptography, authentication and digital signatures, access control mechanisms, privacy, and anonymisation.  
 
In more detail, the aims of the module are to give you an understanding of:  
  • the different types of security threats and their effect on data privacy and business functions 
  • the fundamental principles of information security 
  • the fundamental principles of cryptography 
  • the fundamental principles of secure and privacy-aware data processing
INTENDED LEARNING OUTCOMES (ILOs) (see assessment section below for how ILOs will be assessed)

On successful completion of this module you should be able to:

Module Specific Skills and Knowledge

1. Explain the fundamental information/cyber security concepts 
2. Select the appropriate security controls for a cyber system
3. Select the appropriate privacy controls for a cyber system

Discipline Specific Skills and Knowledge

4. Understand the role of cyber information security in online commercial, financial and other activities 
5. Understand the security and privacy guarantees and the limitations of modern security and privacy controls

Personal and Key Transferable / Employment Skills and Knowledge

6. Assessing and understanding the limitations of technology 
7. Understand risk and to manage risk

 

SYLLABUS PLAN - summary of the structure and academic content of the module
The module will cover: 
 
Information Security Fundamentals 
  • Integrity, reliability, and availability 
  • Authentication, identification, and authorisation  
  • Access control 
 
Cryptography 
  • Symmetric encryption 
  • Asymmetric encryption 
  • Digital signatures, certificates, and public key infrastructures (KPIs) 
  • Security protocols 
 
Authentic and secure communication channels 
  • Formal modelling of security protocols 
  • Formal analysis of security protocols 
 
Privacy 
  • Differential privacy 
  • Privacy-preserving technologies
LEARNING AND TEACHING
LEARNING ACTIVITIES AND TEACHING METHODS (given in hours of study time)
Scheduled Learning & Teaching Activities 33 Guided Independent Study 117 Placement / Study Abroad 0
DETAILS OF LEARNING ACTIVITIES AND TEACHING METHODS
Category Hours of study time Description
Scheduled Learning and Teaching Activities 22 Lectures
Scheduled Learning and Teaching Activities 11 Tutorials or Practical Work
Guided Independent Study 117 Background Reading and Self-Study

 

ASSESSMENT
FORMATIVE ASSESSMENT - for feedback and development purposes; does not count towards module grade
Form of Assessment Size of Assessment (e.g. duration/length) ILOs Assessed Feedback Method
Tutorials and Practical Work  11 hours  All Oral
 

 

SUMMATIVE ASSESSMENT (% of credit)
Coursework 40 Written Exams 60 Practical Exams 0
DETAILS OF SUMMATIVE ASSESSMENT
Form of Assessment % of Credit Size of Assessment (e.g. duration/length) ILOs Assessed Feedback Method
Written exam  60 2 hours (Summer) All Oral on request 
Coursework  40 50 hours  All Written 
 

 

DETAILS OF RE-ASSESSMENT (where required by referral or deferral)
Original Form of Assessment Form of Re-assessment ILOs Re-assessed Time Scale for Re-assessment
Written Exam  Written exam (2 hours All August Ref/Def Period
Coursework Coursework All August Ref/Def Period
 

 

RE-ASSESSMENT NOTES

Reassessment will be by coursework and/or written exam in the failed or deferred element only. For referred candidates, the module mark will be capped at 50%. For deferred candidates, the module mark will be uncapped.

 

RESOURCES
INDICATIVE LEARNING RESOURCES - The following list is offered as an indication of the type & level of
information that you are expected to consult. Further guidance will be provided by the Module Convener

https://vle.exeter.ac.uk/

Reading list for this module:

There are currently no reading list entries found for this module.

CREDIT VALUE 15 ECTS VALUE 7.5
PRE-REQUISITE MODULES None
CO-REQUISITE MODULES None
NQF LEVEL (FHEQ) 7 AVAILABLE AS DISTANCE LEARNING No
ORIGIN DATE Monday 20th December 2021 LAST REVISION DATE Wednesday 20th December 2023
KEY WORDS SEARCH Cryptography, Privacy, Access Control, Cybersecurity, Information Security

Please note that all modules are subject to change, please get in touch if you have any questions about this module.