Teaching Responsibility

LJMU Schools involved in Delivery:

LJMU Partner Taught

Learning Methods

Lecture

Practical

Tutorial

Module Offerings

6718YCOM-JAN-PAR

Aims

To develop an understanding of various security vulnerabilities in and threats to computer networks as well as the importance of network security. To assess critically a variety of cryptographic algorithms and security techniques for protection of computer networks. To promote the use of appropriate security techniques to solve network security problems.

Learning Outcomes

1.
Critically evaluate a variety of general security threats and vulnerabilities
2.
Identify and analyse complex security problems for a given application
3.
Apply advanced knowledge of cryptographic algorithms, security protocols and mechanisms for the provision of security services needed for secure networked applications
4.
Apply appropriate security techniques to solve network security problems

Module Content

Outline Syllabus:Fundamentals of cryptography and network security: cryptographic concepts and models, number theory, security concepts, security threats and vulnerabilities, authentication principles and means, trust management, and importance of network security and its applications. Cryptographic techniques: cryptanalytic attacks, conventional/symmetric cryptography, block cipher operation, stream ciphers, public-key/asymmetric cryptography, cryptographic key distribution, key establishment, hash functions, message authentication code and digital signatures. Security measures: message integrity, message confidentiality, user and message authentication, public-key certification, key certificate validation and revocation, and X.509 directory authentication services. Network security applications: network-based authentication protocols and services, IP security for secure Internet-based communications, virtual private networks, web security, e-mail security, and wireless security.
Additional Information:The spectacular growth of the Internet has spawned a great demand for awareness of security threats to computer networks and application of security techniques to network protection. In response to the demand, this module examines various security issues, cryptographic algorithms and security services that are essential for network protection.

Assessments

Report

Exam