Computer Security
MODULE CODE
CREDIT VALUE
Module Aims
Aim 1
To examine a range of vulnerabilities and attacks on computer systems and networks.
Aim 2
To instil a vigilant attitude towards potential system weaknesses.
Aim 3
To develop an understanding of methods for protecting communication and computer systems.
Aim 4
To encourage a systematic approach to computer security.
Aim 5
To integrate the students’ skills by tackling the complex problem of system security.
Module Content
Key Concepts of Protection:
Security policies
Such as Acceptable Use Statement, ethical behaviour standards, and procedures including risk analysis.
Access Controls
Identification and authentication procedures, password security, biometric systems and the intrinsic security of operating systems along with access control lists.
Cryptography
Symmetric encryption. Asymmetric encryption. Key distribution. Digital certificates. Digital signatures. Hash functions.
General Security Measures
Intrusion Detection systems, Firewalls, DMZ, Antivirus screening,
Intrusion Detection Systems and Observing usage, for example Log files.
Key Elements of Attack
Reconnaissance
Finding information about computer systems involves a wide range of activities from accessing general information: Public information and whois databases to employing Port scanning, Vulnerability scanning and Network Mapping tools. The legitimate and illegitimate uses of security software.
Spoofing
IP spoofing, Mail spoofing, Website spoofing. Source routing. Trust relationships. Man-in-the-middle attacks. Cookies; tracking. Social engineering.
Coding Security
Buffer overflows; stack, heap overflows; stack canary; etc.
Threat Landscape
Overview of malware. Case studies of security breaches and attacks.
Learning Outcomes
On successful completion of this module, a student will be able to:
Teaching Methods
The module examines a useful range of the fundamental aspects of computer security. Lectures provide the formal taught content, while the practical / tutorial sessions supplement and support the lectures using a series of mini-assignments that allow a discovery approach to learning. Case studies of security breaches and attacks are also discussed.
Students are directed to supplementary reading material that elaborates on the topics covered, at the appropriate level for this module.
The subject material and the software employed have the potential to be used legitimately and illegitimately. Students are therefore required to create for themselves, in a democratic exercise, an “Acceptable Use Statement” for the ethical operation of the module, with appropriate penalties for its contravention. All students must sign this statement before the practical / tutorial sessions can begin.
The summative assessment is designed to test the students’ comprehension and application of the concepts taught or discovered in a written examination and their practical skills in the use of security tools and techniques in a coursework assignment.
Assessment Methods
This module is assessed through an examination and a report.