Teaching Responsibility

LJMU Schools involved in Delivery:

LJMU Partner Taught

Learning Methods

Lecture

Practical

Tutorial

Module Offerings

7533CYQR-APR-PAR

7533CYQR-JAN-PAR

7533CYQR-SEP_NS-PAR

Aims

To develop an understanding of various security vulnerabilities in and threats to computer networks as well as the importance of network security. To assess critically a variety of generic security technologies for protection of computer networks. To promote the use of appropriate security techniques to solve network security problems.

Learning Outcomes

1.
Demonstrate critical awareness of network security threats and vulnerabilities
2.
Apply security analysis skills to complex security problems for a given application.
3.
Critically evaluate security protocols and mechanisms for the provision of security services needed for secure networked applications.
4.
Demonstrate comprehensive understanding of security techniques to solve network security problems.

Module Content

Outline Syllabus:Fundamentals of network security: security concepts, security policies, security threats and vulnerabilities, authentication principles and means, trust management, and importance of network security and its applications. Cryptographic techniques: cryptanalytic attacks, conventional/symmetric cryptography (e.g. DES), public-key/asymmetric cryptography (e.g. RSA), cryptographic key distribution, key establishment, hash functions (e.g. SHA), message authentication code and digital signatures (e.g. DSA). Security measures: message integrity, message confidentiality, user and message authentication, public-key certification, key certificate validation and revocation, and X.509 directory authentication services. Network security applications: network-based authentication protocols and services (e.g. Kerberos), IP security (e.g. IPSec) for secure Internet-based communications, virtual private networks, web security (e.g. SSL/TLS), e-mail security (e.g. PGP), and wireless security.
Additional Information:The spectacular growth of the Internet has spawned a great demand for awareness of security threats to computer networks and application of security techniques to network protection. In response to the demand, this module examines various security issues and solutions to network protection.

Assessments

Exam

Report