CE235-5-SP-CO:
Computer Security

The details
2020/21
Computer Science and Electronic Engineering (School of)
Colchester Campus
Spring
Undergraduate: Level 5
Current
Sunday 17 January 2021
Friday 26 March 2021
15
29 July 2020

 

Requisites for this module
(none)
(none)
(none)
(none)

 

CE324

Key module for

BENGG420 Computer Networks,
BENGG421 Computer Networks (Including Year Abroad),
BENGI120 Computer Networks (Including Placement Year)

Module description

This module considers security as it relates to a single computer at an introductory level. Cryptography is introduced and the various scenarios that involve encryption and authentication are investigated. There will be practical work that will give students an opportunity to explore key security tools. The management and planning issues are covered in policy and risk management.

Module aims

This module aims to consider security as it relates to a single computer at an introductory level. Cryptography is introduced and the various scenarios that involve encryption and authentication are investigated. There will be practical work that will give students an opportunity to explore key security tools. The management and planning issues are covered in policy and risk management.

Module learning outcomes

After completing this module, students will be expected to be able to:

1. Identify and describe common security vulnerabilities.
2. Describe the nature of malicious code and how it can spread, be identified and removed.
3. Compare the performance of various cryptographic schemes.
4. Explain the principles of risk analysis and use risk analysis to select controls.

Module information

Outline Syllabus

Principles of security
- Confidentiality, integrity and availability (CIA)
- Vulnerabilities, threats, controls
- Forensics and recovery of systems

Secure Applications
- Common problems in applications
- Detailed example of stack based buffer overflow

Malware and malicious code
- Viruses, trojans, worms
- History and classification
- Anatomy of a virus and how viruses spread
- Identifying viruses and antivirus software

Cryptography
- Applications of encryption to computer security
- Types of encryption algorithms
- Examples of encryption algorithms commonly used
- Public-key cryptography

User authentication
-Methods of user authentication
-Biometric access control (e.g. fingerprint, iris etc.)
-Other techniques (e.g. smartcard)

Security policy
-Example security policy

Learning and teaching methods

Lectures and Labs

Bibliography

  • Pfleeger, Charles P.; Pfleeger, Shari Lawrence; Margulies, Jonathan. (2015) Security in computing, Upper Saddle River, NJ: Prentice Hall.

The above list is indicative of the essential reading for the course. The library makes provision for all reading list items, with digital provision where possible, and these resources are shared between students. Further reading can be obtained from this module's reading list.

Assessment items, weightings and deadlines

Coursework / exam Description Deadline Coursework weighting
Coursework   Progress Test - wk 21    33.33% 
Coursework   Autumn Term Reassessment Assignment (REASSESSMENT STUDENTS ONLY)     
Coursework   Programming Assignment 1    16.67% 
Coursework   Programming Assignment 2    16.66% 
Coursework   Programming Assignment 3    33.34% 
Exam  Main exam: 180 minutes during Summer (Main Period) 

Exam format definitions

  • Remote, open book: Your exam will take place remotely via an online learning platform. You may refer to any physical or electronic materials during the exam.
  • In-person, open book: Your exam will take place on campus under invigilation. You may refer to any physical materials such as paper study notes or a textbook during the exam. Electronic devices may not be used in the exam.
  • In-person, open book (restricted): The exam will take place on campus under invigilation. You may refer only to specific physical materials such as a named textbook during the exam. Permitted materials will be specified by your department. Electronic devices may not be used in the exam.
  • In-person, closed book: The exam will take place on campus under invigilation. You may not refer to any physical materials or electronic devices during the exam. There may be times when a paper dictionary, for example, may be permitted in an otherwise closed book exam. Any exceptions will be specified by your department.

Your department will provide further guidance before your exams.

Overall assessment

Coursework Exam
30% 70%

Reassessment

Coursework Exam
30% 70%
Module supervisor and teaching staff
Prof Jianhua He, email: j.he@essex.ac.uk.
Dr Jianhua He, Dr Xinruo Zhang
School Office, email: csee-schooloffice (non-Essex users should add @essex.ac.uk to create full e-mail address), Telephone 01206 872770

 

Availability
Yes
No
No

External examiner

Dr Yunfei Chen
University of Warwick
Associate Professor
Resources
Available via Moodle
Of 248 hours, 0 (0%) hours available to students:
248 hours not recorded due to service coverage or fault;
0 hours not recorded due to opt-out by lecturer(s).

 

Further information

Disclaimer: The University makes every effort to ensure that this information on its Module Directory is accurate and up-to-date. Exceptionally it can be necessary to make changes, for example to programmes, modules, facilities or fees. Examples of such reasons might include a change of law or regulatory requirements, industrial action, lack of demand, departure of key personnel, change in government policy, or withdrawal/reduction of funding. Changes to modules may for example consist of variations to the content and method of delivery or assessment of modules and other services, to discontinue modules and other services and to merge or combine modules. The University will endeavour to keep such changes to a minimum, and will also keep students informed appropriately by updating our programme specifications and module directory.

The full Procedures, Rules and Regulations of the University governing how it operates are set out in the Charter, Statutes and Ordinances and in the University Regulations, Policy and Procedures.