Security for Safety-Critical Systems - COM00114M

« Back to module search

  • Department: Computer Science
  • Module co-ordinator: Dr. Richard Hawkins
  • Credit value: 10 credits
  • Credit level: M
  • Academic year of delivery: 2016-17

Module occurrences

Occurrence Teaching cycle
A Summer Term 2016-17

Module aims

  • Differentiate between confidentiality, integrity and availability
  • Define and explain security definitions and concepts
  • Summarise the differences between types of security (physical, information, data network)
  • Define and explain information security risk management activities throughout the system lifecycle (development, monitoring and change)
  • Identify information security methods and considerations
  • Describe architectural approaches to mitigating security risk
  • Describe current approaches to security regulation for safety-critical systems
  • Explain the content and differences between different security standards e.g. ED-202, ED-203, ED-204, ISO27005:2011
  • Assess the interdependencies between safety and security
  • Participate in a security-safety risk assessment
  • Describe the current limitations of the engineering of safe and secure systems
  • Describe the concept of assurance cases for safety and security

Module learning outcomes

This module aims to provide a broad awareness of security principles, measures and techniques; to provide a critical understanding of the interrelationships between safety and security and how security threats can develop into hazardous events; to address the elements identified in this figure.

Assessment

Task Length % of module mark
Essay/coursework
Coursework
N/A 100

Special assessment rules

None

Reassessment

Task Length % of module mark
Essay/coursework
Coursework
N/A 100

Module feedback

Individual feedback is provided via the online feedback system. There will be structured feedback showing how your answers achieved the specific points we were looking for in the marking scheme, and additional comments may be provided where required.

Key texts

**** Charles P. Pfleeger and Shari L. Pfleeger, Security in computing, Prentice Hall, 2007

**** Dieter Gollmann, Computer security, Wiley, 2006

**** Ross J. Anderson, Security engineering: a guide to build dependable distributed systems, Wiley, 2001



The information on this page is indicative of the module that is currently on offer. The University is constantly exploring ways to enhance and improve its degree programmes and therefore reserves the right to make variations to the content and method of delivery of modules, and to discontinue modules, if such action is reasonably considered to be necessary by the University. Where appropriate, the University will notify and consult with affected students in advance about any changes that are required in line with the University's policy on Approval of Modifications to Existing Taught Programmes of Study.