CE235-5-SP-CO:
Computer Security
2020/21
Computer Science and Electronic Engineering (School of)
Colchester Campus
Spring
Undergraduate: Level 5
Current
Sunday 17 January 2021
Friday 26 March 2021
15
29 July 2020
Requisites for this module
(none)
(none)
(none)
(none)
CE324
BENGG420 Computer Networks,
BENGG421 Computer Networks (Including Year Abroad),
BENGI120 Computer Networks (Including Placement Year)
This module considers security as it relates to a single computer at an introductory level. Cryptography is introduced and the various scenarios that involve encryption and authentication are investigated. There will be practical work that will give students an opportunity to explore key security tools. The management and planning issues are covered in policy and risk management.
This module aims to consider security as it relates to a single computer at an introductory level. Cryptography is introduced and the various scenarios that involve encryption and authentication are investigated. There will be practical work that will give students an opportunity to explore key security tools. The management and planning issues are covered in policy and risk management.
After completing this module, students will be expected to be able to:
1. Identify and describe common security vulnerabilities.
2. Describe the nature of malicious code and how it can spread, be identified and removed.
3. Compare the performance of various cryptographic schemes.
4. Explain the principles of risk analysis and use risk analysis to select controls.
Outline Syllabus
Principles of security
- Confidentiality, integrity and availability (CIA)
- Vulnerabilities, threats, controls
- Forensics and recovery of systems
Secure Applications
- Common problems in applications
- Detailed example of stack based buffer overflow
Malware and malicious code
- Viruses, trojans, worms
- History and classification
- Anatomy of a virus and how viruses spread
- Identifying viruses and antivirus software
Cryptography
- Applications of encryption to computer security
- Types of encryption algorithms
- Examples of encryption algorithms commonly used
- Public-key cryptography
User authentication
-Methods of user authentication
-Biometric access control (e.g. fingerprint, iris etc.)
-Other techniques (e.g. smartcard)
Security policy
-Example security policy
- Pfleeger, Charles P.; Pfleeger, Shari Lawrence; Margulies, Jonathan. (2015) Security in computing, Upper Saddle River, NJ: Prentice Hall.
The above list is indicative of the essential reading for the course. The library makes provision for all reading list items, with digital provision where possible, and these resources are shared between students. Further reading can be obtained from this module's reading list.
Assessment items, weightings and deadlines
Coursework / exam |
Description |
Deadline |
Coursework weighting |
Coursework |
Progress Test - wk 21 |
|
33.33% |
Coursework |
Autumn Term Reassessment Assignment (REASSESSMENT STUDENTS ONLY) |
|
|
Coursework |
Programming Assignment 1 |
|
16.67% |
Coursework |
Programming Assignment 2 |
|
16.66% |
Coursework |
Programming Assignment 3 |
|
33.34% |
Exam |
Main exam: 180 minutes during Summer (Main Period)
|
Exam format definitions
- Remote, open book: Your exam will take place remotely via an online learning platform. You may refer to any physical or electronic materials during the exam.
- In-person, open book: Your exam will take place on campus under invigilation. You may refer to any physical materials such as paper study notes or a textbook during the exam. Electronic devices may not be used in the exam.
- In-person, open book (restricted): The exam will take place on campus under invigilation. You may refer only to specific physical materials such as a named textbook during the exam. Permitted materials will be specified by your department. Electronic devices may not be used in the exam.
- In-person, closed book: The exam will take place on campus under invigilation. You may not refer to any physical materials or electronic devices during the exam. There may be times when a paper dictionary,
for example, may be permitted in an otherwise closed book exam. Any exceptions will be specified by your department.
Your department will provide further guidance before your exams.
Overall assessment
Reassessment
Module supervisor and teaching staff
Prof Jianhua He, email: j.he@essex.ac.uk.
Dr Jianhua He, Dr Xinruo Zhang
School Office, email: csee-schooloffice (non-Essex users should add @essex.ac.uk to create full e-mail address), Telephone 01206 872770
Yes
No
No
Dr Yunfei Chen
University of Warwick
Associate Professor
Available via Moodle
Of 248 hours, 0 (0%) hours available to students:
248 hours not recorded due to service coverage or fault;
0 hours not recorded due to opt-out by lecturer(s).
Disclaimer: The University makes every effort to ensure that this information on its Module Directory is accurate and up-to-date. Exceptionally it can
be necessary to make changes, for example to programmes, modules, facilities or fees. Examples of such reasons might include a change of law or regulatory requirements,
industrial action, lack of demand, departure of key personnel, change in government policy, or withdrawal/reduction of funding. Changes to modules may for example consist
of variations to the content and method of delivery or assessment of modules and other services, to discontinue modules and other services and to merge or combine modules.
The University will endeavour to keep such changes to a minimum, and will also keep students informed appropriately by updating our programme specifications and module directory.
The full Procedures, Rules and Regulations of the University governing how it operates are set out in the Charter, Statutes and Ordinances and in the University Regulations, Policy and Procedures.