Computer Science and Electronic Engineering (School of)
Postgraduate: Level 7
Monday 15 January 2024
Friday 22 March 2024
01 March 2023
Requisites for this module
MSC G400CH Advanced Computer Science,
MSC H60112 Computer Networks and Security
Students are not permitted to undertake this module if they have done the equivalent module of CE324 at UG level on a CSEE undergraduate course. This is because it cannot count towards your course credits. Please contact the CSEE School Office for specific advice on your module choices.
This course considers the application of security to networked computers and systems, extending on the content of Computer Security (which examined security as applied to a single computer). It explains how to secure a network by applying methods to detect, mitigate and/or stop attacks. Based on the assumption that public networks will always be open to compromise, this course introduces techniques to secure transmitted data, including the management of encryption systems and communication.
Based on the assumption that public networks will always be open to compromise, this module introduces techniques to secure transmitted data,
including the management of encryption systems and communication.
On completion of the module, students will be expected to be able to:
1. Identify and describe common network security vulnerabilities/attacks
2. Design computer network architectures that reduce security risks
3. Formulate firewall table rules and in general be familiar with network boundary protection.
4. Identify and describe the operation of security tools for network security applications
5. Propose suitable security techniques for encryption and authentication
6. Analyse the key management techniques required for encrypted communication/authentication
7. Analyse security problem scenarios and propose integrative solutions
Principles of network security and privacy. Introduction to the different types of network-based attack (or non-malicious problem) that may require attention.
Securing a computer network at the network layer:
Techniques to identify network vulnerabilities and review of the relevant network layer protocols. Types of firewall. Configuring network firewalls and application gateways. Computer architectures and topologies that reduce risk of attack. Network policies that support security. Securing wireless systems. Stopping network layer and DNS-based spoofing.
Detecting and mitigating network based attacks:
Network intrusion detection systems. Fake systems (honeypots) for attack deflection/detection. Adapting network policy in reaction to attack.
Key management for encryption and authentication:
Ticket-based authentication systems including Kerberos. Public key infrastructure (PKI). Securing Email communication. Secure network management.
Secure communication protocols:
Securing application/transport layer protocols using secure socket layer (SSL) including secure HTTP web transfer. Securing network layer transmission through IP security (IPsec). Virtual private networks (VPNs). Secure web-based applications (cookies, cross-site scripting, and spoofing).
Lectures and Revision classes
The above list is indicative of the essential reading for the course.
The library makes provision for all reading list items, with digital provision where possible, and these resources are shared between students.
Further reading can be obtained from this module's reading list
Assessment items, weightings and deadlines
|Coursework / exam
||Lab Test 1 (MCQ test open book)
||Lab Test 2 (MCQ test open book)
||Main exam: In-Person, Open Book (Restricted), 120 minutes during Early Exams
||Reassessment Main exam: In-Person, Open Book (Restricted), 120 minutes during January
||Reassessment Main exam: In-Person, Open Book (Restricted), 120 minutes during September (Reassessment Period)
Exam format definitions
- Remote, open book: Your exam will take place remotely via an online learning platform. You may refer to any physical or electronic materials during the exam.
- In-person, open book: Your exam will take place on campus under invigilation. You may refer to any physical materials such as paper study notes or a textbook during the exam. Electronic devices may not be used in the exam.
- In-person, open book (restricted): The exam will take place on campus under invigilation. You may refer only to specific physical materials such as a named textbook during the exam. Permitted materials will be specified by your department. Electronic devices may not be used in the exam.
- In-person, closed book: The exam will take place on campus under invigilation. You may not refer to any physical materials or electronic devices during the exam. There may be times when a paper dictionary,
for example, may be permitted in an otherwise closed book exam. Any exceptions will be specified by your department.
Your department will provide further guidance before your exams.
Module supervisor and teaching staff
Prof Martin Reed, email: firstname.lastname@example.org.
Dr Martin Reed
School Office, email: csee-schooloffice (non-Essex users should add @essex.ac.uk to create full e-mail address), Telephone 01206 872770
Dr Anthony Olufemi Tesimi Adeyemi-Ejeye
Available via Moodle
Of 101 hours, 21 (20.8%) hours available to students:
80 hours not recorded due to service coverage or fault;
0 hours not recorded due to opt-out by lecturer(s).
Disclaimer: The University makes every effort to ensure that this information on its Module Directory is accurate and up-to-date. Exceptionally it can
be necessary to make changes, for example to programmes, modules, facilities or fees. Examples of such reasons might include a change of law or regulatory requirements,
industrial action, lack of demand, departure of key personnel, change in government policy, or withdrawal/reduction of funding. Changes to modules may for example consist
of variations to the content and method of delivery or assessment of modules and other services, to discontinue modules and other services and to merge or combine modules.
The University will endeavour to keep such changes to a minimum, and will also keep students informed appropriately by updating our programme specifications and module directory.
The full Procedures, Rules and Regulations of the University governing how it operates are set out in the Charter, Statutes and Ordinances and in the University Regulations, Policy and Procedures.