Computer Systems and Security
MODULE CODE
CREDIT VALUE
Module Aims
Aim 1
Explore the fundamentals of computer architecture and operating systems.
Aim 2
Examine a range of recent security threats and data breaches, their consequences on businesses and potential countermeasures.
Aim 3
Create awareness of the importance of complying with law, ethical and privacy issues regarding any collected data.
Aim 4
Discuss recent technologies and their emerging security problems.
Aim 5
Make students mindful of their computer security behaviour.
Module Content
Computer System Components/Architecture
Top level view of computer functions and interconnection including computer components (e.g. CPUs, Primary/Secondary/Cache Memory, I/O devices), application programs and users.
Operating Systems Concepts
What Operating Systems (OSs) do? Process/Memory/Storage Management, Process Synchronisation, Concurrency, Transactions Management, Deadlocks, File Systems and Hardware Virtualisation.
Key Concepts of Protection and Security
Legal issues, Privacy and Ethics (e.g. Legal requirements such as Data Protection Act, Computer Misuse Act, the right to privacy, the ethics of accessing materials without the necessary authority). Foundations of Computer Security (Confidentiality, Integrity, Availability, Accountability, Non-repudiation, Reliability), Computer Security Objectives, Security Management (Policies, Measures etc.), Risk & Threat Analysis (Assets, Threats, Vulnerabilities, Attacks).
Security Tools
Identification and Authentication, Access Control (User-Centred Security Approach), Cryptography as a tool (Symmetric/Asymmetric Encryption, Digital Signatures, Secure Hashing), Firewalls, Detection, Prevention and Recovery Mechanisms, Aftermath (Digital Forensics for investigating, monitoring and preventing).
Introduction to Computing Systems Security
A subset of the following topics will be considered, depending on topical issues: Linux OR Windows Security, Database Security, Web Security, Mobile Phone Security, Social Network Security and Privacy issues and Wireless Network Security.
Emerging Technologies Security, Privacy and Ethical issues
A subset of the following topics will be considered, depending on topical issues: Smart City security (e.g., recent hacks against smart vehicles), IoT Security, Smart Grids Security, and more as new emerging technologies come under attacks every day.
Learning Outcomes
On successful completion of this module, a student will be able to:
Teaching Methods
The module examines a useful range of the fundamental aspects of computer systems and security. Lectures will be delivered on campus to provide the formal taught content including concepts, techniques and information without digging into the mathematical details of some tools (e.g., cryptography).
The practical/tutorial sessions supplement and support the lectures allowing a discovery approach to learning.
Students are expected to engage in research activities for case studies and latest news of security breaches and hacks. URLs that contain relevant research material will be provided to the students in support of the syllabus. Students will prepare and share summaries of technologies and system components.
Students will discuss case studies and explore implications: e.g. considering commercial issues (e.g. “How much security is enough?”), ethical issues (e.g. “Is it ethical to crack copy protection?”), legal issues (e.g. “Can I connect to my neighbour’s WiFi?”), and social issues (e.g. “Should governments engage in cyber-warfare?”)
The assessment is designed to assess both the students’ comprehension of theoretical topics relevant to computer systems and security and their practical skills in tools and methods needed to achieve computing systems security. This also includes evaluation/assessment of recent security/data breaches and how to deal with them.
Assessment Methods
This module is assessed through a summary of investigation and a report.