Module Descriptors
COMPUTER SECURITY: LOW LEVEL (D/L)
COCS71164
Key Facts
Digital, Technology, Innovation and Business
Level 7
15 credits
Contact
Leader: Oluwasegun Adedugbe
Hours of Study
Scheduled Learning and Teaching Activities: 3
Independent Study Hours: 147
Total Learning Hours: 150
Assessment
  • ASSIGNMENT (3000 WORDS APPROX) weighted at 100%
Module Details
ADDITIONAL ASSESSMENT DETAILS
Assignment 100% (learning outcomes 1-3)
Assignment (3000 words excluding appendices) will typically require a critical review of mechanisms, algorithms and protocols followed by design and implementation of a low level security component and an analysis of the effectiveness of some chosen method through direct investigation.
INDICATIVE CONTENT
Cryptography mechanisms and encryption standards, Security Protocols, Access Control, Authentication and Authorisation, Single Signon, Secure Network Protocols (IPSec, SSL, Kerberos), Malware, Enterprise DMZs,
Data Centre Security, Email security, Web security, VOIP security.
LEARNING STRATEGIES
The material will be presented through a combination of directed self-study, recorded lectures, on-line materials in Blackboard, practical exercises that can be conducted using the server infrastructure and VPN to provide access to platforms for practical exercises, asynchronous handling of queries via email and discussion board, but also synchronous surgery sessions and skype as necessary.
RESOURCES
Access to forensic computing laboratory that can be isolated from the University network.
Dual boot with Linux and Windows O/S.
Java and C language platforms
Access to network laboratories
TEXTS
Mark Stamp, Information Security: Principles and Practice, WileyInterscience
(October 28, 2005), ISBN: 9780471738480

Pfleeger, C.P., S. L. Pfleeger, Security in Computing, Prentice Hall, 4 edition (October 23, 2006), ISBN: 9780132390774

William Stallings, Lawrie Brown, Computer Security: Principles and Practice, 2008, Prentice Hall, ISBN: 9780136004240

Ido Dubrawsky, Designing and building enterprise DMZs, 2006, Syngress

Other journal articles, trade publications and internet sources as appropriate
LEARNING OUTCOMES
1. Demonstrate systematic understanding of the principles and concepts involved in low level security mechanisms, algorithms and protocols used in the securing of computer systems. (Knowledge and Understanding).
2. Specify, design and implement an exemplar low level security component and critically validate its effectiveness. (Application, Problem Solving).
3. Critically evaluate various mechanisms, algorithms and protocols used to secure computer systems from research and direct investigation and analysis of data collected. (Enquiry, Knowledge and Understanding).