Computer Science

ECM2426 - Network and Computer Security (2019)

Back | Download as PDF
MODULE TITLENetwork and Computer Security CREDIT VALUE15
MODULE CODEECM2426 MODULE CONVENERProf Achim D. Brucker (Coordinator)
DURATION: TERM 1 2 3
DURATION: WEEKS 11 0 0
Number of Students Taking Module (anticipated) 90
DESCRIPTION - summary of the module content

Network and computer security is now widely recognized as a vital aspect in the design, development, and implementation of today’s computer systems. Billions have been spent on strengthening the security of computer systems to defend against hacking, malicious code, data theft, denial-of-service attacks, etc. This module will provide a solid understanding of the main issues related to security in modern computer systems and networks. You will learn the foundations of computer security, techniques to secure complex systems, and gain practical skills in assessing the threats to the security of networked computer systems.

Pre-requisite ECM1417

AIMS - intentions of the module

This module aims to create awareness of the need for security and introduce security mechanisms in modern computer systems. We will explore topics such as fundamentals of computer security, technology and principles of network security, cryptography, authentication and digital signatures, access control mechanisms and software security. The module gives you practical hands-on experience of testing security applications, applying security methods, and protecting networked systems.

INTENDED LEARNING OUTCOMES (ILOs) (see assessment section below for how ILOs will be assessed)

On successful completion of this module you should be able to:


Module Specific Skills and Knowledge:

1. Demonstrate understanding of the concepts, issues, and theories of cryptography and security;

2. Demonstrate theoretical and practical knowledge of security technologies, tools, and services;

3. Gain practical experience of developing solutions to networks and computer security challenges.

Discipline Specific Skills and Knowledge:

4. Show an awareness of the need for network and computer security;

5. Demonstrate good design and development skills.

Personal and Key Transferable / Employment Skills and Knowledge:

6. Demonstrate practical knowledge of current security methods and tools.

SYLLABUS PLAN - summary of the structure and academic content of the module

Security Fundamentals and Access Control:

  - Integrity, Reliability, Availability;

  - Authentication & Identification;

  - Access Control Models.

 

Introduction into Cryptography:

  - Symmetric and asymmetric encryption;

  - Attacking enryption*;

  - Signatures.

 

Security Protocols:

  - Authentic and secure communication;

  - Formal modelling of security protocols;

  - Formal analysis of security protocols.

 

Software Security:

  - Software vulnerabilities;

  - Secure software development;

- Security testing.



LEARNING AND TEACHING
LEARNING ACTIVITIES AND TEACHING METHODS (given in hours of study time)
Scheduled Learning & Teaching Activities 72.00 Guided Independent Study 78.00 Placement / Study Abroad 0.00
DETAILS OF LEARNING ACTIVITIES AND TEACHING METHODS
Category Hours of study time Description
Scheduled learning & Teaching activities 22 Lectures
Scheduled learning & Teaching activities 50 Workshops/tutorials
Guided independent study 50 Individual assessed work
Guided independent study 28 Guided Independent study

 

ASSESSMENT
FORMATIVE ASSESSMENT - for feedback and development purposes; does not count towards module grade
Form of Assessment Size of Assessment (e.g. duration/length) ILOs Assessed Feedback Method
Laboratory exercises 10 x 15 minutes All  Oral and Written
       
       
       
       

 

SUMMATIVE ASSESSMENT (% of credit)
Coursework 30 Written Exams 70 Practical Exams 0
DETAILS OF SUMMATIVE ASSESSMENT
Form of Assessment % of Credit Size of Assessment (e.g. duration/length) ILOs Assessed Feedback Method
Written exam - closed book 70 2 hours Winter Examination 1,2,4,5 Oral on request
Coursework - Foundations and Crypto 15 25 hours 1,2 Written
Security protocols and software security 15 25 hours 1,2,3,4,5 Written
         
         

 

DETAILS OF RE-ASSESSMENT (where required by referral or deferral)
Original Form of Assessment Form of Re-assessment ILOs Re-assessed Time Scale for Re-assessment
Written exam - closed book Written exam- closed book (70%) All August Ref/Def Period
Coursework – practical security assignments Coursework – practical security assignments (30%) All Completed over summer with a deadline in August

 

RE-ASSESSMENT NOTES

Students may be referred/deferred in the written exam, the coursework, or both, depending on their performance in the original assessment or the reasons for referral/deferral.

RESOURCES
INDICATIVE LEARNING RESOURCES - The following list is offered as an indication of the type & level of
information that you are expected to consult. Further guidance will be provided by the Module Convener

Basic reading:

 

ELE: http://vle.exeter.ac.uk/

 

Web based and Electronic Resources:

 

Other Resources:

 

Reading list for this module:

Type Author Title Edition Publisher Year ISBN Search
Set R.J. Anderson Security Engineering: A Guide to Building Dependable Distributed Systems 1st John Wiley 2001 0471389226 [Library]
Set A.J.Menezes, S.A. Vanstone and P.C.V. Oorschot Handbook of Applied Cryptography 5th CRC Press 2001 0849385237 [Library]
Set Pfleeger, C. P., Pfleeger, S. L., Margulies, J Security in Computing 5th Prentice Hall 2015 978-0-13-408504-3 [Library]
Set William Stallings Cryptography and Network Security: Principles and Practice 2013 [Library]
Set N. Daswani, C. Kern and A. Kesavan Foundations of Security: What Every Programmer Needs to Know Apress 2007 [Library]
Set M. Howard, D. LeBlanc and J. Viega 24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them 1st McGraw Hill 2010 [Library]
Set B. Chess and J. West Secure Programming with Static Analysis 1st Addison Wesley 2007 [Library]
Set D. Stuttard and M. Pinto The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws O'Reilly 2011 [Library]
Set Michael T. Goodrich and Roberto Tamassia Introduction to Computer Security Addison Wesley 2011 0-32-151294-4 [Library]
Set John R. Vacca Computer and Information Security Handbook 2nd 2013 [Library]
Set William Stallings, Lawrie Brown Computer Security: Principles and Practice 3rd 2014 [Library]
CREDIT VALUE 15 ECTS VALUE 7.5
PRE-REQUISITE MODULES ECM1417
CO-REQUISITE MODULES
NQF LEVEL (FHEQ) 6 AVAILABLE AS DISTANCE LEARNING No
ORIGIN DATE Tuesday 10 July 2018 LAST REVISION DATE Tuesday 02 July 2019
KEY WORDS SEARCH Network; computer security.