CE724-7-SP-CO:
Secure Software Systems Engineering
2024/25
Computer Science and Electronic Engineering (School of)
Colchester Campus
Spring
Postgraduate: Level 7
Future
Monday 13 January 2025
Friday 21 March 2025
15
22 October 2024
Requisites for this module
(none)
(none)
(none)
(none)
(none)
MSC G41912 Cyber Security
This module delves into the concept of security by design, emphasizing the importance of building robust systems from the ground up to minimize vulnerabilities. By integrating security measures at the earliest stages of system development, the module highlights how risks can be significantly reduced. Students will explore key principles of secure design, focusing on proactive strategies to identify and mitigate weaknesses before they can be exploited. Through case studies and real-world examples, the module provides a comprehensive understanding of how security can be embedded into the architecture of both software and hardware systems.
In addition, the module connects the concept of security by design to a detailed understanding of how threats can be addressed at multiple levels, from the application layer to the network and infrastructure layers. It examines various types of security threats and the appropriate countermeasures for each, ensuring that learners are equipped with the knowledge to implement multi-layered defense strategies. By focusing on both theoretical frameworks and practical solutions, the module enables students to not only understand how to design secure systems but also how to continuously adapt to emerging threats in an ever-evolving digital landscape.
The aims of this module are:
- To instil a security by design methodology within the understanding of cyber security.
- To provide students with in-depth knowledge and practical experience on analysing and designing secure software systems using appropriate methodological approaches.
By the end of this module, students will be expected to be able to:
- Evaluate and apply theoretical and practical approaches to modelling and analysing security requirements.
- Conduct threat analysis.
- Synthesise security models using state-of-the-art research methodologies.
- Appraise the role of human factors in cyber security.
Indicative syllabus information
- Security requirements engineering methodologies and tools
- Practical demonstration of security-by-design concepts
- Human factors in cybersecurity
- Usable security
- Insider threats
- Psychology of security
- Design and implementation methodologies
- Minimizing the risk of vulnerabilities
- Risk modeling and risk-based decision making
- Threat landscape and adversarial thinking
- Common attacks
- Human and technical attacks
- Malicious code and situational awareness
- Computer Emergency Response Teams (CERTs)
- Secure software practices, guidelines, and standards
- Social engineering
- Malware analysis
- Static and dynamic analysis
- Detection techniques
- Penetration testing
This module will be delivered via:
- Two 1-hour lecture per week (10 weeks)
- One 2-hour laboratory per week (10 weeks)
- Two 1-hour revision lectures in Summer Term
Inclusivity is ensured in the following ways: lecturers and other teachers are informed at the start of the term about students with special needs; student voice groups allow representatives to discuss issues surrounding learning for minorities.
This module does not appear to have a published bibliography for this year.
Assessment items, weightings and deadlines
Coursework / exam |
Description |
Deadline |
Coursework weighting |
Exam format definitions
- Remote, open book: Your exam will take place remotely via an online learning platform. You may refer to any physical or electronic materials during the exam.
- In-person, open book: Your exam will take place on campus under invigilation. You may refer to any physical materials such as paper study notes or a textbook during the exam. Electronic devices may not be used in the exam.
- In-person, open book (restricted): The exam will take place on campus under invigilation. You may refer only to specific physical materials such as a named textbook during the exam. Permitted materials will be specified by your department. Electronic devices may not be used in the exam.
- In-person, closed book: The exam will take place on campus under invigilation. You may not refer to any physical materials or electronic devices during the exam. There may be times when a paper dictionary,
for example, may be permitted in an otherwise closed book exam. Any exceptions will be specified by your department.
Your department will provide further guidance before your exams.
Overall assessment
Reassessment
Module supervisor and teaching staff
No
No
No
No external examiner information available for this module.
Available via Moodle
No lecture recording information available for this module.
Disclaimer: The University makes every effort to ensure that this information on its Module Directory is accurate and up-to-date. Exceptionally it can
be necessary to make changes, for example to programmes, modules, facilities or fees. Examples of such reasons might include a change of law or regulatory requirements,
industrial action, lack of demand, departure of key personnel, change in government policy, or withdrawal/reduction of funding. Changes to modules may for example consist
of variations to the content and method of delivery or assessment of modules and other services, to discontinue modules and other services and to merge or combine modules.
The University will endeavour to keep such changes to a minimum, and will also keep students informed appropriately by updating our programme specifications and module directory.
The full Procedures, Rules and Regulations of the University governing how it operates are set out in the Charter, Statutes and Ordinances and in the University Regulations, Policy and Procedures.