Teaching Responsibility
LJMU Schools involved in Delivery:
Computer Science and Mathematics
Learning Methods
Lecture
Tutorial
Module Offerings
6201COMP-SEP-CTY
Aims
To develop an understanding of Computer Security and to understand security threats and vulnerabilities to information, computing and communications systems.
To critically assess a variety of security technologies for protection of computer devices/systems/networks.
To promote the use of appropriate methodologies and tools in the analysis, design, implementation of secure systems.
To examine current research issues in Computer Security.
Learning Outcomes
1.
Critically evaluate the threats and vulnerabilities to information, computing and communications systems.
2.
Design and develop security countermeasures for computing applications.
3.
Critically assess the use of information security management techniques.
Module Content
Outline Syllabus:The spectacular growth of the Internet has spawned a great demand for awareness of security threats to computer networks and application of security techniques to network protection. In response to the demand, this module examines various security issues and solutions to computer and network protection. Throughout the academic year, the syllabus material will cover:
-Computer security background; security goals, problems, models.
-Fundamental security design principles: OSI architecture, levels of security impact, threat modelling (STRIDE and DREAD).
-Network security: network characteristics and topologies, vulnerabilities and attacks, OSI model – security issues, attacks, threats, security control.
-System security - technologies including firewalls, intrusion detection systems, intrusion prevention systems, virtual private networks, anti-viruses, access controls.
-Malicious software: malware propagation, payload, countermeasures.
-Blockchain and cryptocurrency
-Securing devices and network from attack; safe use of the Internet, the Internet of Things (IoT), defence-in-depth.
-Access control: importance, principles, Bell-LaPadula, Chinese wall, Biba model.
-Cryptographic techniques: algorithms, protocols, authentication, key management and public key infrastructures.
-Introducing security research topics; e.g. advanced persistent threats, trusted computing, composition, digital rights, IoT security and privacy concerns, big data.
Module Overview:
This module aims to develop your understanding of Computer Security including security threats and vulnerabilities to information, computing and communications systems. Through critically assessing a variety of generic security technologies for protection of computer networks, you will develop practical skills in the use of security countermeasure technologies and associated tools.
This module aims to develop your understanding of Computer Security including security threats and vulnerabilities to information, computing and communications systems. Through critically assessing a variety of generic security technologies for protection of computer networks, you will develop practical skills in the use of security countermeasure technologies and associated tools.
Additional Information:This module aims to develop an understanding of Computer Security and to understand security threats and vulnerabilities to information, computing and communications systems. Through assessing critically a variety of generic security technologies for protection of computer networks, students will develop practical skills in the use of security countermeasure technologies and associated tools.