CE235-5-SP-CO:
Computer Security

The details
2019/20
Computer Science and Electronic Engineering (School of)
Colchester Campus
Spring
Undergraduate: Level 5
Current
Monday 13 January 2020
Friday 20 March 2020
15
19 November 2019

 

Requisites for this module
(none)
(none)
(none)
(none)

 

CE324

Key module for

BENGG420 Computer Networks,
BENGG421 Computer Networks (Including Year Abroad),
BENGI120 Computer Networks (Including Placement Year),
BSC GH56 Information and Communication Technology,
BSC GH5P Information and Communication Technology (Including Year Abroad),
BSC I102 Information and Communication Technology (Including Placement Year)

Module description

This module considers security as it relates to a single computer at an introductory level. Cryptography is introduced and the various scenarios that involve encryption and authentication are investigated. There will be practical work that will give students an opportunity to explore key security tools. The management and planning issues are covered in policy and risk management.

Module aims

This module aims to consider security as it relates to a single computer at an introductory level. Cryptography is introduced and the various scenarios that involve encryption and authentication are investigated. There will be practical work that will give students an opportunity to explore key security tools. The management and planning issues are covered in policy and risk management.

Module learning outcomes

After completing this module, students will be expected to be able to:

1. Identify and describe common security vulnerabilities.
2. Describe the nature of malicious code and how it can spread, be identified and removed.
3. Compare the performance of various cryptographic schemes.
4. Explain the principles of risk analysis and use risk analysis to select controls.

Module information

Outline Syllabus

Principles of security
- Confidentiality, integrity and availability (CIA)
- Vulnerabilities, threats, controls
- Forensics and recovery of systems

Secure Applications
- Common problems in applications
- Detailed example of stack based buffer overflow

Malware and malicious code
- Viruses, trojans, worms
- History and classification
- Anatomy of a virus and how viruses spread
- Identifying viruses and antivirus software

Cryptography
- Applications of encryption to computer security
- Types of encryption algorithms
- Examples of encryption algorithms commonly used
- Public-key cryptography

User authentication
-Methods of user authentication
-Biometric access control (e.g. fingerprint, iris etc.)
-Other techniques (e.g. smartcard)

Security policy
-Example security policy

Learning and teaching methods

Lectures and Labs

Bibliography

This module does not appear to have any essential texts. To see non-essential items, please refer to the module's reading list.

Assessment items, weightings and deadlines

Coursework / exam Description Deadline Weighting
Coursework Progress Test - wk 24 33.33%
Coursework Programming Assignment 1 31/01/2020 33.33%
Coursework Programming Assignment 2 14/02/2020 16.67%
Coursework Programming Assignment 3 28/02/2020 16.66%
Exam 120 minutes during Summer (Main Period) (Main)
Exam 120 minutes during Summer (Main Period) (Main)

Overall assessment

Coursework Exam
30% 70%

Reassessment

Coursework Exam
30% 70%
Module supervisor and teaching staff
Dr Morteza Varasteh
School Office, email: csee-schooloffice (non-Essex users should add @essex.ac.uk to create full e-mail address), Telephone 01206 872770

 

Availability
Yes
No
No

External examiner

Dr Jeremy Ian Hiller Gow
Goldsmiths College
Lecturer
Dr Yunfei Chen
University of Warwick
Associate Professor
Dr Jeremy Ian Hiller Gow
Goldsmiths College
Lecturer
Dr Yunfei Chen
University of Warwick
Associate Professor
Resources
Available via Moodle
Of 46 hours, 33 (71.7%) hours available to students:
13 hours not recorded due to service coverage or fault;
0 hours not recorded due to opt-out by lecturer(s).

 

Further information

Disclaimer: The University makes every effort to ensure that this information on its Module Directory is accurate and up-to-date. Exceptionally it can be necessary to make changes, for example to programmes, modules, facilities or fees. Examples of such reasons might include a change of law or regulatory requirements, industrial action, lack of demand, departure of key personnel, change in government policy, or withdrawal/reduction of funding. Changes to modules may for example consist of variations to the content and method of delivery or assessment of modules and other services, to discontinue modules and other services and to merge or combine modules. The University will endeavour to keep such changes to a minimum, and will also keep students informed appropriately by updating our programme specifications and module directory.

The full Procedures, Rules and Regulations of the University governing how it operates are set out in the Charter, Statutes and Ordinances and in the University Regulations, Policy and Procedures.