Skip to content

Computer Security

UCLan Cyprus Logo

MODULE CODE

CO2508 (L5)

CREDIT VALUE

20 UK CREDITS / 10 ECTS
Computer Security

Module Aims

Aim 1


To examine a range of vulnerabilities and attacks on computer systems and networks.

Aim 2


To instil a vigilant attitude towards potential system weaknesses.

Aim 3


To develop an understanding of methods for protecting communication and computer systems.

Aim 4


To encourage a systematic approach to computer security.

Aim 5


To integrate the students’ skills by tackling the complex problem of system security.

Computer Security

Module Content

Key Concepts of Protection:
Security policies
Such as Acceptable Use Statement, ethical behaviour standards, and procedures including risk analysis.
Access Controls
Identification and authentication procedures, password security, biometric systems and the intrinsic security of operating systems along with access control lists.
Cryptography
Symmetric encryption. Asymmetric encryption. Key distribution. Digital certificates. Digital signatures. Hash functions.
General Security Measures
Intrusion Detection systems, Firewalls, DMZ, Antivirus screening,
Intrusion Detection Systems and Observing usage, for example Log files.
Key Elements of Attack
Reconnaissance
Finding information about computer systems involves a wide range of activities from accessing general information: Public information and whois databases to employing Port scanning, Vulnerability scanning and Network Mapping tools. The legitimate and illegitimate uses of security software.
Spoofing
IP spoofing, Mail spoofing, Website spoofing. Source routing. Trust relationships. Man-in-the-middle attacks. Cookies; tracking. Social engineering.
Coding Security
Buffer overflows; stack, heap overflows; stack canary; etc.
Threat Landscape
Overview of malware. Case studies of security breaches and attacks.

PROGRAMME SPECIFICATIONS

Learning Outcomes

On successful completion of this module, a student will be able to:


Discuss potential threats to computer systems and networks.


Propose and justify suitable security measures for a networked computer system.


Explain the role of cryptographic techniques.


Evaluate tools and techniques for system security.

Computer Security

Teaching Methods

The module examines a useful range of the fundamental aspects of computer security. Lectures provide the formal taught content, while the practical / tutorial sessions supplement and support the lectures using a series of mini-assignments that allow a discovery approach to learning. Case studies of security breaches and attacks are also discussed.
Students are directed to supplementary reading material that elaborates on the topics covered, at the appropriate level for this module.
The subject material and the software employed have the potential to be used legitimately and illegitimately. Students are therefore required to create for themselves, in a democratic exercise, an “Acceptable Use Statement” for the ethical operation of the module, with appropriate penalties for its contravention. All students must sign this statement before the practical / tutorial sessions can begin.
The summative assessment is designed to test the students’ comprehension and application of the concepts taught or discovered in a written examination and their practical skills in the use of security tools and techniques in a coursework assignment.

Computer Security

Assessment Methods

This module is assessed through an examination and a report.

Explore them all

View The Other Course’s Modules

Compulsory

Optional

Register your Interest

Register Now
Scroll to Top
Date
DRAG