Module Descriptors
COMPUTER SECURITY: HIGH LEVEL
COCS70407
Key Facts
Faculty of Computing, Engineering and Sciences
Level 7
15 credits
Contact
Leader: Pooneh Bagheri Zadeh
Hours of Study
Scheduled Learning and Teaching Activities: 36
Independent Study Hours: 114
Total Learning Hours: 150
Assessment
  • ASSIGNMENT weighted at 100%
Module Details
Module Resources
Access to forensic computing laboratory that can be isolated from the University network
Access to network laboratories
VMware
Module Special Admissions Requirements
None.
Module Indicative Content
Security Standards (ISO 27002), Penetration Testing, Vulnerability Assessment, Operating System Hardening, Incident Response, Security Models, Security Policy and Risk Analysis.
Human Factors in security. Legal and ethical issues.
Module Additional Assessment Details
Assignment (3000 words excluding appendices) will typically require a critical review of tools, techniques used and performance of an analysis or investigation of a given high level security component.
Assessing Learning Outcomes 1-3.
Module Learning Strategies
Lectures 1 hour per week, tutorial/practical 2 hours per week, directed reading and research.
The tutorial/practical session will have to be scheduled in an appropriate laboratory.
(1:n)1 (1:20)2
Module Texts
Ed Skoudis, Tom Liston, Counter Hack Reloaded, Prentice Hall, Pearson Education, 2006, ISBN-13: 978-0-13-148104-6.
Robert Schifreen, Defeating the Hackers, Wiley, 2006, ISBN: 0-470-02555-7

ISO 27002, Code of practice for information security, ISO/IEC
Andrew Whitaker, Daniel P. Newman, Penetration Testing and Network Defense, Cisco Press, 2005, ISBN: 1-58705-208-3
Harris, S., Harper, A., Eagle, C., Ness, J., Gray Hat Hacking: The Ethical Hacker's Handbook, 2nd Edition, McGraw-Hill, 2008, ISBN: 0071495681
Handbook for Computer Security Incident Response Teams (CSIRTs), 2003, Carnegie Mellon University
Steve Manzuik, Network security assessment: from vulnerability to patch, 2007, Syngress William Stallings, Lawrie Brown, Computer Security: Principles and Practices, 2008, ISBN: 9780136004240
Pfleeger, C.P., S. L. Pfleeger, Security in Computing, Prentice Hall, 4th Edition, 2006, ISBN: 978-0132390774

Other journal articles, trade publications and internet sources as appropriate.