Accessibility statement

Information & Network Security - COM00171M

« Back to module search

  • Department: Computer Science
  • Module co-ordinator: Dr. Siamak Shahandashti
  • Credit value: 20 credits
  • Credit level: M
  • Academic year of delivery: 2022-23
    • See module specification for other years: 2021-22

Module summary

This module covers the basic concepts of cyber security, how these are modelled, threat models, and the mechanisms to enforce security policies.

Module will run

Occurrence Teaching period
A Autumn Term 2022-23 to Spring Term 2022-23

Module aims

This module will cover the basic concepts of cyber security (confidentiality, integrity and availability), how these are modelled (importance of identity, trust, reputation), threat models (adversary capabilities and goals), and basic control mechanisms to enforce security policies (e.g. access control). Students will learn to understand network security, threats, and the mechanisms that have been developed to counter them. It explores a range of different networked systems, the main network attacks, and their defence mechanisms.

Module learning outcomes

  • Be able to assess the relative merits of different solution approaches in various security-related contexts.

  • Understand and explain the importance of identity, trust, reputation and related concepts, why they are needed and how they are implemented in modern-day systems.

  • Be able to identify major threats to identity, trust and reputation in a variety of system types.

  • Analyse network protocols, identify associated attacks, and analyse security strengths/weaknesses in network mechanisms

Assessment

Task Length % of module mark
Essay/coursework
Essay: NETS 1
N/A 50
Essay/coursework
Essay: NETS 2
N/A 50

Special assessment rules

None

Reassessment

Task Length % of module mark
Essay/coursework
Essay: NETS 1
N/A 50
Essay/coursework
Essay: NETS 2
N/A 50

Module feedback

Feedback is provided through work in practical sessions, discussion in seminars, and after each assessment as per normal University guidelines.

Indicative reading

Sherri Davidoff, Jonathan Ham, Network Forensics: Tracking Hackers Through Cyberspace, Prentice Hall, 2012

Kevin R Fall, W Richard Stevens, TCP/IP Illustrated, Volume 1: The protocols, Addison Wesley, 2012

Andrew Tannenbaum, Computer Networks, Prentice Hall, 2002



The information on this page is indicative of the module that is currently on offer. The University is constantly exploring ways to enhance and improve its degree programmes and therefore reserves the right to make variations to the content and method of delivery of modules, and to discontinue modules, if such action is reasonably considered to be necessary by the University. Where appropriate, the University will notify and consult with affected students in advance about any changes that are required in line with the University's policy on the Approval of Modifications to Existing Taught Programmes of Study.