Module Descriptors
COMPUTER SECURITY: LOW LEVEL
COCS70520
Key Facts
Digital, Technology, Innovation and Business
Level 7
15 credits
Contact
Leader: Oluwasegun Adedugbe
Hours of Study
Scheduled Learning and Teaching Activities: 39
Independent Study Hours: 111
Total Learning Hours: 150
Assessment
  • ASSIGNMENT weighted at 50%
  • EXAMINATION - UNSEEN IN EXAMINATION CONDITIONS weighted at 50%
Module Details
Module Additional Assessment Details
Assignment 50% (learning outcomes 2 and 3)
Assignment (1500 words excluding appendices) will typically require a critical review of mechanisms, algorithms and protocols follwed by design and implementation of a low level security component and an analysis of the effectiveness of some chosen method through direct investigation.

Exam, 2 hours, 50% (learning outcomes 1 and 3)
Module Resources
Access to forensic computing laboratory that can be isolated from the University network.
Dual boot with Linux and Windows O/S.
Java and C language platforms
Access to network laboratories
Module Special Admissions Requirements
None.
Module Indicative Content
Cryptography mechanisms and encryption standards, Security Protocols, Access Control, Authentication and Authorisation, Single Sign-on, Secure Network Protocols (IPSec, SSL, Kerberos), Malware, Enterprise DMZs, Data Centre Security, Email security, Web security, VOIP security.
Module Learning Strategies
Lectures 2 hours per week, tutorial/practical 1 hour per week, directed reading and research.
(1:n)2 (1:20)1
Module Texts
Mark Stamp, Information Security: Principles and Practice, Wiley-Interscience (October 28, 2005), ISBN: 978-0-471-73848-0
Pfleeger, C.P., S. L. Pfleeger, Security in Computing, Prentice Hall, 4 edition (October 23, 2006), ISBN: 978-0132390774
William Stallings, Lawrie Brown, Computer Security: Principles and Practice, 2008, Prentice Hall, ISBN: 9780136004240
Ido Dubrawsky, Designing and building enterprise DMZs, 2006, Syngress

Other journal articles, trade publications and internet sources as appropriate