INFORMATION AND NETWORK SECURITY - 2018/9
Module code: COMM048
The module introduces general information and network security principles, challenges and goals and then focuses on main security mechanisms and protocols for protecting network communication across different layers of the Internet protocol stack. This will include discussion on various attacks on the networks, penetration testing tools and possible countermeasures to ensure protection of authentication, confidentiality and end-to-end security of communications. In labs students will be able to practice experience with various network security protocols and tools.
CHEN Liqun (Computer Sci)
Number of Credits: 15
ECTS Credits: 7.5
Framework: FHEQ Level 7
JACs code: I120
Module cap (Maximum number of students): N/A
Prerequisites / Co-requisites
- Information and network security challenges and goals
- Internet security threats, network-level vulnerabilities and their exploitation (e.g. flooding/spoofing/man-in-the-middle attacks on Internet protocols (incl. ARP, IP, TCP) and network components, DDoS attacks)
- Network security tools (e.g. nmap, wireshark, scapy), incl. penetration testing for networks
- Kerberos authentication and key management
- IPsec (incl. Internet Key Exchange) and Virtual Private Networks (incl. IP tunneling)
- Transport Layer Security (incl. TLS handshake/record layer/alert protocol, OpenSSL library)
- Public Key Infrastructures and X.509 certificates
- Intrusion Detection Systems (incl. host-based, network-based, hybrid IDS, honeypots, monitoring and logging activities)
|Assessment type||Unit of assessment||Weighting|
|School-timetabled exam/test||IN-SEMESTER TEST (INDIVIDUAL) (1 HOUR)||20|
The assessment strategy is designed to provide students with the opportunity to demonstrate that they have achieved the module learning outcomes.
Thus, the summative assessment for this module consists of:
· An individual in-semester test with a set of questions that students are required to answer.
This addresses LO1 and LO2.
· An individual coursework with a set of theoretical and practical tasks.
This addresses LO1, LO2 and LO3.
Formative assessment and feedback
Lecture slides are used extensively in the lectures with each lecture consisting of a number of slides explaining the theory and showing the examples. Solutions to lab exercises are explained during the lab session and provided to the students.
- The aim of this module is to equip students with background knowledge and practical experience of modern information and network security mechanisms, including widely used network security protocols and technologies. The module will explain various attacks on the network communications and demonstrate the use of appropriate protection mechanisms. The module will cover theoretical foundations of modern information and network security mechanisms and practical understanding of those mechanisms with their application in the real world.
|1||Understand information and network security principles, challenges and goals that are relevant for the protection of information and network communication against various types of attacks in the real world||KC|
|2||Understand the functionality, advantages and disadvantages of main protection mechanisms and protocols for securing network communications||KCT|
|3||Experience practical application of network security protocols and technologies||KPT|
C - Cognitive/analytical
K - Subject knowledge
T - Transferable skills
P - Professional/Practical skills
Overall student workload
Lecture Hours: 15
Laboratory Hours: 10
Methods of Teaching / Learning
The learning and teaching strategy is designed to:
- Help students understand the nature of information and network security, including main principles, challenges and goals
- Explain threats and attacks arising in the context of network communications
- Explain the functionality of network security protocols and relevant protection mechanisms
- Enable students to apply existing security mechanisms and protocols for the protection of network communications
The learning and teaching methods include:
- Lectures (15 hours) using detailed lecture slides to gauge the students’ understanding
- Labs (10 hours) using computing labs, exercise sheets and their solutions.
Students will be expected to distribute the remaining workload on self-study, preparation for lectures and labs, preparation for the in-semester test and submission of the coursework.
Indicated Lecture Hours (which may also include seminars, tutorials, workshops and other contact time) are approximate and may include in-class tests where one or more of these are an assessment on the module. In-class tests are scheduled/organised separately to taught content and will be published on to student personal timetables, where they apply to taken modules, as soon as they are finalised by central administration. This will usually be after the initial publication of the teaching timetable for the relevant semester.
Reading list for INFORMATION AND NETWORK SECURITY : http://aspire.surrey.ac.uk/modules/comm048
Programmes this module appears in
|Computer and Internet Engineering MEng||1||Optional||A weighted aggregate mark of 50% is required to pass the module|
|Information Security MSc||1||Compulsory||A weighted aggregate mark of 50% is required to pass the module|
|Information Systems MSc||1||Optional||A weighted aggregate mark of 50% is required to pass the module|
Please note that the information detailed within this record is accurate at the time of publishing and may be subject to change. This record contains information for the most up to date version of the programme / module for the 2018/9 academic year.