Accessibility statement

Network Security - COM00188M

« Back to module search

  • Department: Computer Science
  • Module co-ordinator: Dr. Yuchen Zhao
  • Credit value: 20 credits
  • Credit level: M
  • Academic year of delivery: 2023-24
    • See module specification for other years: 2024-25

Module summary

Network Security (NETS): This module covers the basic concepts of cyber security, how these are modelled, threat models, and the mechanisms to enforce security policies.

Module will run

Occurrence Teaching period
A Semester 1 2023-24

Module aims

This module aims to provide a broad knowledge of network and system security, addressing threats over a range of network layers and detailing corresponding defensive countermeasures and protocols. The module will cover the basic concepts of cyber security (confidentiality, integrity and availability), how these are modelled, threat models (adversary capabilities and goals), and basic control mechanisms to enforce security policies (e.g. access control). Students will learn to understand network security, threats, and the mechanisms that have been developed to counter them. It explores a range of different networked systems, the main network attacks, and their defence mechanisms.

Module learning outcomes

By the end of the module the students will be able to:

  1. Understand the fundamental concepts of cyber security in systems and networks
  2. Analyse security strengths & weaknesses in network mechanisms
  3. Analyse major threats and attacks in systems and networks under various scenarios, architectures, and threat models
  4. Synthesise control solutions for network security
  5. Assess the relative merits of different solution approaches in various security-related contexts


Task Length % of module mark
NETS Coursework
N/A 100

Special assessment rules



Task Length % of module mark
NETS Resubmission
N/A 100

Module feedback

Feedback is provided through work in practical sessions, discussion in seminars, and after each assessment as per normal University guidelines.

Indicative reading

Sherri Davidoff, Jonathan Ham, Network Forensics: Tracking Hackers Through Cyberspace, Prentice Hall, 2012

Kevin R Fall, W Richard Stevens, TCP/IP Illustrated, Volume 1: The protocols, Addison Wesley, 2012

Andrew Tannenbaum, Computer Networks, Prentice Hall, 2002

The information on this page is indicative of the module that is currently on offer. The University is constantly exploring ways to enhance and improve its degree programmes and therefore reserves the right to make variations to the content and method of delivery of modules, and to discontinue modules, if such action is reasonably considered to be necessary by the University. Where appropriate, the University will notify and consult with affected students in advance about any changes that are required in line with the University's policy on the Approval of Modifications to Existing Taught Programmes of Study.