- Homepage
- Key Information
- Students
- Taught programmes (UG / PGT)
- Student Services and Procedures
- Student Support
- Events and Colloquia
- International Students
- Students as Change Agents (SACA)
- Student Staff Liaison Committees (SSLC)
- The Exeter Award
- Peer Support
- Skills Development
- Equality and Diversity
- Athena SWAN
- Outreach
- Living Systems Institute Webpage
- Alumni
- Info points and hubs
- Staff
- PGR
- Health and Safety
- Computer Support
- National Student Survey (NSS)
- Intranet Help
- College Website
ECM2426 - Network and Computer Security (2017)
MODULE TITLE | Network and Computer Security | CREDIT VALUE | 15 |
---|---|---|---|
MODULE CODE | ECM2426 | MODULE CONVENER | Unknown |
DURATION: TERM | 1 | 2 | 3 |
---|---|---|---|
DURATION: WEEKS | 11 | 0 | 0 |
Number of Students Taking Module (anticipated) | 90 |
---|
Network and computer security is now widely recognized as a vital aspect in the design, development, and implementation of today’s computer systems. Billions have been spent on strengthening the security of computer systems to defend against hacking, malicious code, data theft, denial-of-service attacks, etc. This module will provide a solid understanding of the main issues related to security in modern computer systems and networks. You will learn the foundations of computer security, techniques to secure complex systems, and gain practical skills in managing networked computer systems.
Pre-requisite ECM1417
This module aims to create awareness of the need for security and introduce security mechanisms in modern computer systems. We will explore topics such as fundamentals of computer security, technology and principles of network security, cryptography, authentication and digital signatures, access control mechanisms, software security, and database security. The module gives you practical hands-on experience of testing security applications, applying security methods, and protecting networked systems.
On successful completion of this module you should be able to:
Module Specific Skills and Knowledge
2. Demonstrate theoretical and practical knowledge of security technologies, tools, and services
Discipline Specific Skills and Knowledge
5. Demonstrate good design and development skills
Personal and Key Transferable / Employment Skills and Knowledge
- Computer security concepts
- Cryptography overview
- Network security concepts
- Authentication and digital signatures
- Access control mechanisms
- Firewalls and Intrusion detection
- Malicious software and software security
- Database security
Scheduled Learning & Teaching Activities | 72.00 | Guided Independent Study | 78.00 | Placement / Study Abroad | 0.00 |
---|
Category | Hours of study time | Description |
Scheduled learning & Teaching activities | 22 | Lectures |
Scheduled learning & Teaching activities | 50 | Workshops/tutorials |
Guided independent study | 50 | Individual assessed work |
Guided independent study | 28 | Guided Independent study |
Form of Assessment | Size of Assessment (e.g. duration/length) | ILOs Assessed | Feedback Method |
---|---|---|---|
Selected workshops will be marked; work done in other workshops will be discussed with the student in subsequent workshops | 2 x 2 hour workshops | All | Oral and Written |
Coursework | 30 | Written Exams | 70 | Practical Exams | 0 |
---|
Form of Assessment | % of Credit | Size of Assessment (e.g. duration/length) | ILOs Assessed | Feedback Method |
---|---|---|---|---|
Written exam- closed book | 70 | 2 hours Winter Exam Period | 1,2,4,5 | Oral on request |
Coursework – practical security assignments | 30 | 50 hours | All | Written |
Original Form of Assessment | Form of Re-assessment | ILOs Re-assessed | Time Scale for Re-assessment |
---|---|---|---|
Written exam- closed book | Written exam- closed book (70%) | All | August Ref/Def Period |
Coursework – practical security assignments | Coursework – practical security assignments (30%) | All | Completed over summer with a deadline in August |
Students may be referred/deferred in the written exam, the coursework, or both, depending on their performance in the original assessment or the reasons for referral/deferral.
information that you are expected to consult. Further guidance will be provided by the Module Convener
Basic reading:
ELE: http://vle.exeter.ac.uk/
Web based and Electronic Resources:
Other Resources:
Reading list for this module:
Type | Author | Title | Edition | Publisher | Year | ISBN | Search |
---|---|---|---|---|---|---|---|
Set | Pfleeger, C. P., Pfleeger, S. L., Margulies, J | Security in Computing | 5th | Prentice Hall | 2015 | 978-0-13-408504-3 | [Library] |
Set | John R. Vacca | Computer and Information Security Handbook | 2nd | 2013 | [Library] | ||
Set | William Stallings, Lawrie Brown | Computer Security: Principles and Practice | 3rd | 2014 | [Library] | ||
Set | William Stallings | Cryptography and Network Security: Principles and Practice | 2013 | [Library] | |||
Set | Michael T. Goodrich and Roberto Tamassia | Introduction to Computer Security | Addison Wesley | 2011 | 0-32-151294-4 | [Library] |
CREDIT VALUE | 15 | ECTS VALUE | 7.5 |
---|---|---|---|
PRE-REQUISITE MODULES | ECM1417 |
---|---|
CO-REQUISITE MODULES |
NQF LEVEL (FHEQ) | 6 | AVAILABLE AS DISTANCE LEARNING | No |
---|---|---|---|
ORIGIN DATE | Monday 29 February 2016 | LAST REVISION DATE | Tuesday 03 July 2018 |
KEY WORDS SEARCH | Network, computer security |
---|