Module Texts
Mark Stamp, Information Security: Principles and Practice, Wiley-Interscience (October 28, 2005), ISBN: 978-0-471-73848-0
Pfleeger, C.P., S. L. Pfleeger, Security in Computing, Prentice Hall, 4 edition (October 23, 2006), ISBN: 978-0132390774
William Stallings, Lawrie Brown, Computer Security: Principles and Practice, 2008, Prentice Hall, ISBN: 9780136004240
Ido Dubrawsky, Designing and building enterprise DMZs, 2006, Syngress
Other journal articles, trade publications and internet sources as appropriate
Module Resources
Access to forensic computing laboratory that can be isolated from the University network.
Dual boot with Linux and Windows O/S.
Java and C language platforms
Access to network laboratories
Module Special Admissions Requirements
None.
Module Learning Strategies
Lectures 2 hours per week, tutorial/practical 2 hours per week, directed reading and research.
(1:n)2 (1:20)2
Module Additional Assessment Details
Assignment 50% (learning outcomes 2 and 3)
Assignment (1500 words excluding appendices) will typically require a critical review of mechanisms, algorithms and protocols follwed by design and implementation of a low level security component and an analysis of the effectiveness of some chosen method through direct investigation.
Exam, 2 hours, 50% (learning outcomes 1 and 3)
Module Indicative Content
Cryptography mechanisms and encryption standards, Security Protocols, Access Control, Authentication and Authorisation, Single Sign-on, Secure Network Protocols (IPSec, SSL, Kerberos), Malware, Enterprise DMZs, Data Centre Security, Email security, Web security, VOIP security.