Teaching Responsibility

LJMU Schools involved in Delivery:

Computer Science and Mathematics

Learning Methods

Lecture
Practical
Tutorial

Module Offerings

6101COMP-SEP-CTY

Aims

Understand security threats and vulnerabilities to information, computing and communications systems. Assess critically a variety of generic security technologies for protection of computer networks. Develop practical skills in the use of security countermeasure technologies and associated tools.

Learning Outcomes

1.
Critically evaluate the threats and vulnerabilities to information, computing and communications systems.
2.
Design and develop security countermeasures for a computing application
3.
Critically assess the use of information security management techniques.

Module Content

Outline Syllabus:Computer security background; security goals, problems, models. Security services: authentication, key management and PKI, Kerberos. Security technologies including firewalls, intrusion detection systems, biometrics, anti- viruses, access controls. Malware; viruses and worms, botnets, mobile code security. Securing the personal computer and network from attack; safe use of the Internet and Web. Access control: Bell-LaPadula, Chinese Wall, Biba. Cryptographic techniques: algorithms, protocols, authentication, key management and PKI, Kerberos, IPSec, SSL/TLS Security management: policies, risk assessment, legal considerations, privacy, ethics, standards, education. Introducing security research topics; e.g. trusted computing, composition, digital rights.
Module Overview:
Understand security threats and vulnerabilities to information, computing and communications systems. Assess critically a variety of generic security technologies for protection of computer networks. Develop practical skills in the use of security countermeasure technologies and associated tools. The spectacular growth of the Internet has spawned a great demand for awareness of security threats to computer networks and application of security techniques to network protection. In response to the demand, this module examines various security issues and solutions to computer and network protection.
Additional Information:The spectacular growth of the Internet has spawned a great demand for awareness of security threats to computer networks and application of security techniques to network protection. In response to the demand, this module examines various security issues and solutions to computer and network protection.

Assessments

Artefacts
Centralised Exam