Network and Computer Security - 2023 entry
MODULE TITLE | Network and Computer Security | CREDIT VALUE | 15 |
---|---|---|---|
MODULE CODE | ECM2426 | MODULE CONVENER | Prof Achim D. Brucker (Coordinator) |
DURATION: TERM | 1 | 2 | 3 |
---|---|---|---|
DURATION: WEEKS | 11 | 0 | 0 |
Number of Students Taking Module (anticipated) | 150 |
---|
- ECM1400 OR ECM1417 (Understanding a programming language (e.g., Python) and web technologies (e.g., HTML/JavaScript, HTTP, SQL), e.g., as taught in ECM1400 or ECM1417)
- ECM1415/ECM1416 OR MTH1001/2 (Algebra, Logic, and basic probability theory, e.g., as taught in ECM1415 and ECM1416 or MTH1001/2)
This module aims to create awareness of the need for security and introduce security mechanisms in modern computer systems. We will explore topics such as fundamentals of computer security, technology and principles of network security, cryptography, authentication and digital signatures, access control mechanisms and software security. The module gives you practical hands-on experience of testing security applications, applying security methods, and protecting networked systems.
On successful completion of this module you should be able to:
Module Specific Skills and Knowledge:
1. Demonstrate understanding of the concepts, issues, and theories of cryptography and security;
2. Demonstrate theoretical and practical knowledge of security technologies, tools, and services;
3. Gain practical experience of developing solutions to networks and computer security challenges.
Discipline Specific Skills and Knowledge:
4. Show an awareness of the need for network and computer security;
5. Demonstrate good design and development skills.
Personal and Key Transferable / Employment Skills and Knowledge:
6. Demonstrate practical knowledge of current security methods and tools.
Scheduled Learning & Teaching Activities | 72 | Guided Independent Study | 78 | Placement / Study Abroad | 0 |
---|
Category | Hours of study time | Description |
Scheduled learning & Teaching activities | 22 | Lectures |
Scheduled learning & Teaching activities | 50 | Workshops/tutorials |
Guided independent study | 50 | Individual assessed work |
Guided independent study | 28 | Guided Independent study |
Form of Assessment | Size of Assessment (e.g. duration/length) | ILOs Assessed | Feedback Method |
---|---|---|---|
Laboratory exercises | 10 x 15 minutes | All | Oral |
Coursework | 30 | Written Exams | 70 | Practical Exams | 0 |
---|
Form of Assessment | % of Credit | Size of Assessment (e.g. duration/length) | ILOs Assessed | Feedback Method |
---|---|---|---|---|
Written exam | 70 | 90 min Winter Examination | 1,2,4,5 | Oral on request |
Coursework | 30 | 50 hours | 1, 2, 3, 4, 5 | Written |
Original Form of Assessment | Form of Re-assessment | ILOs Re-assessed | Time Scale for Re-assessment |
---|---|---|---|
Written exam - closed book | Written exam- closed book (90 mins) | All | August Ref/Def Period |
Coursework | Coureswork | All | Augus Ref/Def Period |
Reassessment will be by coursework and/or written exam in the failed or deferred element only. For referred candidates, the module mark will be capped at 40%. For deferred candidates, the module mark will be uncapped.
information that you are expected to consult. Further guidance will be provided by the Module Convener
Basic reading:
ELE: http://vle.exeter.ac.uk/
Web based and Electronic Resources:
Other Resources:
Reading list for this module:
Type | Author | Title | Edition | Publisher | Year | ISBN |
---|---|---|---|---|---|---|
Set | R.J. Anderson | Security Engineering: A Guide to Building Dependable Distributed Systems | 1st | John Wiley | 2001 | 0471389226 |
Set | Bishop, Matt | Computer Security: Art and Science | 2nd | Addison Wesley | 2018 | 978-0321712332 |
Set | B. Chess and J. West | Secure Programming with Static Analysis | 1st | Addison Wesley | 2007 | |
Set | N. Daswani, C. Kern and A. Kesavan | Foundations of Security: What Every Programmer Needs to Know | Apress | 2007 | ||
Set | Michael T. Goodrich and Roberto Tamassia | Introduction to Computer Security | Addison Wesley | 2011 | 0-32-151294-4 | |
Set | A.J.Menezes, S.A. Vanstone and P.C.V. Oorschot | Handbook of Applied Cryptography | 5th | CRC Press | 2001 | 0849385237 |
Set | Pfleeger, C. P., Pfleeger, S. L., Margulies, J | Security in Computing | 5th | Prentice Hall | 2015 | 978-0-13-408504-3 |
Set | D. Stuttard and M. Pinto | The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws | O'Reilly | 2011 | ||
Set | John R. Vacca | Computer and Information Security Handbook | 2nd | 2013 |
CREDIT VALUE | 15 | ECTS VALUE | 7.5 |
---|---|---|---|
PRE-REQUISITE MODULES | ECM1400, ECM1417, ECM1415, ECM1416, MTH1001, MTH1002 |
---|---|
CO-REQUISITE MODULES |
NQF LEVEL (FHEQ) | 6 | AVAILABLE AS DISTANCE LEARNING | No |
---|---|---|---|
ORIGIN DATE | Tuesday 10th July 2018 | LAST REVISION DATE | Wednesday 8th February 2023 |
KEY WORDS SEARCH | Network, computer security, confidentiality, cryptography |
---|
Please note that all modules are subject to change, please get in touch if you have any questions about this module.