Computer Science

ECM2426 - Network and Computer Security (2017)

Back | Download as PDF
MODULE TITLENetwork and Computer Security CREDIT VALUE15
MODULE CODEECM2426 MODULE CONVENERUnknown
DURATION: TERM 1 2 3
DURATION: WEEKS 11 0 0
Number of Students Taking Module (anticipated) 90
DESCRIPTION - summary of the module content

Network and computer security is now widely recognized as a vital aspect in the design, development, and implementation of today’s computer systems. Billions have been spent on strengthening the security of computer systems to defend against hacking, malicious code, data theft, denial-of-service attacks, etc. This module will provide a solid understanding of the main issues related to security in modern computer systems and networks. You will learn the foundations of computer security, techniques to secure complex systems, and gain practical skills in managing networked computer systems.

Pre-requisite ECM1417

AIMS - intentions of the module

This module aims to create awareness of the need for security and introduce security mechanisms in modern computer systems. We will explore topics such as fundamentals of computer security, technology and principles of network security, cryptography, authentication and digital signatures, access control mechanisms, software security, and database security. The module gives you practical hands-on experience of testing security applications, applying security methods, and protecting networked systems.

INTENDED LEARNING OUTCOMES (ILOs) (see assessment section below for how ILOs will be assessed)

On successful completion of this module you should be able to:

Module Specific Skills and Knowledge

1. Demonstrate understanding of the concepts, issues, and theories of cryptography and security
2. Demonstrate theoretical and practical knowledge of security technologies, tools, and services
3. Gain practical experience of developing solutions to networks and computer security challenges

Discipline Specific Skills and Knowledge

4. Show an awareness of the need for network and computer security
5. Demonstrate good design and development skills

Personal and Key Transferable / Employment Skills and Knowledge

6. Demonstrate practical knowledge of current security methods and tools.

 

SYLLABUS PLAN - summary of the structure and academic content of the module
  • Computer security concepts
  • Cryptography overview
  • Network security concepts
  • Authentication and digital signatures
  • Access control mechanisms
  • Firewalls and Intrusion detection
  • Malicious software and software security
  • Database security
LEARNING AND TEACHING
LEARNING ACTIVITIES AND TEACHING METHODS (given in hours of study time)
Scheduled Learning & Teaching Activities 72.00 Guided Independent Study 78.00 Placement / Study Abroad 0.00
DETAILS OF LEARNING ACTIVITIES AND TEACHING METHODS
Category Hours of study time Description
Scheduled learning & Teaching activities 22 Lectures
Scheduled learning & Teaching activities 50 Workshops/tutorials
Guided independent study 50 Individual assessed work
Guided independent study 28 Guided Independent study

 

ASSESSMENT
FORMATIVE ASSESSMENT - for feedback and development purposes; does not count towards module grade
Form of Assessment Size of Assessment (e.g. duration/length) ILOs Assessed Feedback Method
Selected workshops will be marked; work done in other workshops will be discussed with the student in subsequent workshops 2 x 2 hour workshops All  Oral and Written
       
       
       
       

 

SUMMATIVE ASSESSMENT (% of credit)
Coursework 30 Written Exams 70 Practical Exams 0
DETAILS OF SUMMATIVE ASSESSMENT
Form of Assessment % of Credit Size of Assessment (e.g. duration/length) ILOs Assessed Feedback Method
Written exam- closed book 70 2 hours Winter Exam Period 1,2,4,5 Oral on request
Coursework – practical security assignments 30 50 hours All Written
         
         
         

 

DETAILS OF RE-ASSESSMENT (where required by referral or deferral)
Original Form of Assessment Form of Re-assessment ILOs Re-assessed Time Scale for Re-assessment
Written exam- closed book Written exam- closed book (70%) All August Ref/Def Period
Coursework – practical security assignments Coursework – practical security assignments (30%) All Completed over summer with a deadline in August

 

RE-ASSESSMENT NOTES

Students may be referred/deferred in the written exam, the coursework, or both, depending on their performance in the original assessment or the reasons for referral/deferral.

RESOURCES
INDICATIVE LEARNING RESOURCES - The following list is offered as an indication of the type & level of
information that you are expected to consult. Further guidance will be provided by the Module Convener

Basic reading:

 

ELE: http://vle.exeter.ac.uk/

 

Web based and Electronic Resources:

 

Other Resources:

 

Reading list for this module:

Type Author Title Edition Publisher Year ISBN Search
Set Pfleeger, C. P., Pfleeger, S. L., Margulies, J Security in Computing 5th Prentice Hall 2015 978-0-13-408504-3 [Library]
Set John R. Vacca Computer and Information Security Handbook 2nd 2013 [Library]
Set William Stallings, Lawrie Brown Computer Security: Principles and Practice 3rd 2014 [Library]
Set William Stallings Cryptography and Network Security: Principles and Practice 2013 [Library]
Set Michael T. Goodrich and Roberto Tamassia Introduction to Computer Security Addison Wesley 2011 0-32-151294-4 [Library]
CREDIT VALUE 15 ECTS VALUE 7.5
PRE-REQUISITE MODULES ECM1417
CO-REQUISITE MODULES
NQF LEVEL (FHEQ) 6 AVAILABLE AS DISTANCE LEARNING No
ORIGIN DATE Monday 29 February 2016 LAST REVISION DATE Tuesday 03 July 2018
KEY WORDS SEARCH Network, computer security