Module Learning Strategies
Lectures 2 hours per week, tutorial/practical 1 hour per week, directed reading and research. The tutorial/practical session will have to be scheduled in an appropriate laboratory.
(1:n)2 (1:20)1
Module Indicative Content
Types of threat and types of system. Protection and detection. Operating System protection mechanisms. Database security. Network configuration and security. Data integrity. Access control and authentication protocols. Principles of encryption and decryption. Common encryption standards. Malicious software. Securing e-business. Security models. Human factors in security. Security policies and planning. Legal and ethical issues.
Module Additional Assessment Details
Assignment 50% (learning outcomes 2, 3)
Exam 2 hours 50% (learning outcomes 1, 3)
Module Special Admissions Requirements
Prior study of CE00371-1, Introduction to Software Development or equivalent and CE00396-1, Object Oriented and Event Driven Programming or equivalent and CE00312-1, Introduction to C Programming and CE00300-1, Hardware, Software Systems and Networks or equivalent.
Module Resources
PC laboratories with Linux & Windows O/S
Java & C language platforms
Access to netwok laboratories.
Module Texts
Essential: Pfleeger, C.P., S. L. Pfleeger, Security in Computing, Prentice Hall, 3rd edition, 2002, ISBN: 01303554488
Anderson, R, Security Engineering: A Guide to Building Dependable Distrbuted Systems, Wiley, 2001, ISBN: 0471389226
Bishop, M, Computer Security: Art and Science, Addison Wesley, 2002, ISBN: 0201440997
Pieprzyk, J., T. Hardjono, J. Seberry, J. Pierprzyk, Fundamentals of Computer Security, Springer-Verlag, 2002, ISBN: 3540431012
Background:
Stajano, F, Security for Ubiquitous Computing, Wiley, 2002, ISBN: 0470844930