ADDITIONAL ASSESSMENT DETAILS
Assignment 100% (learning outcomes 1-3)
Assignment (3000 words excluding appendices) will typically require a critical review of mechanisms, algorithms and protocols followed by design and implementation of a low level security component and an analysis of the effectiveness of some chosen method through direct investigation.
INDICATIVE CONTENT
Cryptography mechanisms and encryption standards, Security Protocols, Access Control, Authentication and Authorisation, Single Signon, Secure Network Protocols (IPSec, SSL, Kerberos), Malware, Enterprise DMZs,
Data Centre Security, Email security, Web security, VOIP security.
LEARNING STRATEGIES
The material will be presented through a combination of directed self-study, recorded lectures, on-line materials in Blackboard, practical exercises that can be conducted using the server infrastructure and VPN to provide access to platforms for practical exercises, asynchronous handling of queries via email and discussion board, but also synchronous surgery sessions and skype as necessary.
RESOURCES
Access to forensic computing laboratory that can be isolated from the University network.
Dual boot with Linux and Windows O/S.
Java and C language platforms
Access to network laboratories
TEXTS
Mark Stamp, Information Security: Principles and Practice, WileyInterscience
(October 28, 2005), ISBN: 9780471738480
Pfleeger, C.P., S. L. Pfleeger, Security in Computing, Prentice Hall, 4 edition (October 23, 2006), ISBN: 9780132390774
William Stallings, Lawrie Brown, Computer Security: Principles and Practice, 2008, Prentice Hall, ISBN: 9780136004240
Ido Dubrawsky, Designing and building enterprise DMZs, 2006, Syngress
Other journal articles, trade publications and internet sources as appropriate
LEARNING OUTCOMES
1. Demonstrate systematic understanding of the principles and concepts involved in low level security mechanisms, algorithms and protocols used in the securing of computer systems. (Knowledge and Understanding).
2. Specify, design and implement an exemplar low level security component and critically validate its effectiveness. (Application, Problem Solving).
3. Critically evaluate various mechanisms, algorithms and protocols used to secure computer systems from research and direct investigation and analysis of data collected. (Enquiry, Knowledge and Understanding).