COMPUTER SECURITY - 2019/0
Module code: COM3009
In light of the Covid-19 pandemic, and in a departure from previous academic years and previously published information, the University has had to change the delivery (and in some cases the content) of its programmes, together with certain University services and facilities for the academic year 2020/21.
These changes include the implementation of a hybrid teaching approach during 2020/21. Detailed information on all changes is available at: https://www.surrey.ac.uk/coronavirus/course-changes. This webpage sets out information relating to general University changes, and will also direct you to consider additional specific information relating to your chosen programme.
Prior to registering online, you must read this general information and all relevant additional programme specific information. By completing online registration, you acknowledge that you have read such content, and accept all such changes.
The rapid development of the Internet, and its increased use for business critical and financial transactions, have made understanding of security issues more important than ever before. This module covers the basic principles behind computer security.
BOUREANU Ioana (Computer Sci)
Number of Credits: 15
ECTS Credits: 7.5
Framework: FHEQ Level 6
JACs code: I100
Module cap (Maximum number of students): N/A
Prerequisites / Co-requisites
The module is divided into the following areas:
- Introduction to security issues and security evaluation
- Introduction to cryptography
- Symmetric and Public Key schemes
- Modern symmetric cryptographic algorithms, e.g., Block Cipher Primitives, AES
- Asymmetric encryption
- Public Key Algorithms, e.g., RSA/ElGamal
- Attacking protocols
- Introduction to Access Control
- Introduction to Authentication in Distributed Systems
- Current Technologies in Security, e.g., VPN, firewalls
|Assessment type||Unit of assessment||Weighting|
|Coursework||CRYPTOGRAPHY AND PROTOCOL ANALYSIS||20|
|Examination||2 HOUR UNSEEN EXAM||80|
The assessment strategy is designed to provide students with the opportunity to demonstrate their achievement of the learning outcomes.
Learning outcomes 1 and 2 are assessed by the coursework, and also by the examination. Learning outcomes 3 and 4 are assessed by the examination.
Thus, the summative assessment for this module consists of:
· Grades for the coursework item against previously published assessment criteria
· Coursework is 20 hours work
· Two hour examination.
Formative assessment and feedback
Verbal feedback is given in lab sessions on the students attempts at the lab exercises and theoretical questions. Written formative feedback is also given on the coursework. Use of the electronic voting handsets in lectures also provides formative feedback for the students.
- develop the students understanding of computer security and its fundamental principles
- focus on the details of cryptographic mechanisms and how they are used to achieve security
- develop an understanding of the difficulties involved in achieving security and the approaches taken in analysing security solutions
- Introduce tools for exploring cryptography and for protocol analysis
- Introduce aspects of access control for information protection
|1||Explain and demonstrate an understanding of the main cryptographic primitives and algorithms||KCT|
|2||Analyse and model cryptographic protocols||KC|
|3||Explain the basic principles of security||KT|
|4||Describe current trends in security threats and countermeasures||P|
C - Cognitive/analytical
K - Subject knowledge
T - Transferable skills
P - Professional/Practical skills
Overall student workload
Lecture Hours: 22
Laboratory Hours: 22
Methods of Teaching / Learning
The learning and teaching strategy is designed to:
Provide students with the knowledge, skills and practical experience covering the module aims and learning outcomes
The learning and teaching methods include:
For each teaching week there will be
- 2 hours of lectures, including use of electronic voting
- 2 hour of labs
- There will also be a revision session to support the module.
Indicated Lecture Hours (which may also include seminars, tutorials, workshops and other contact time) are approximate and may include in-class tests where one or more of these are an assessment on the module. In-class tests are scheduled/organised separately to taught content and will be published on to student personal timetables, where they apply to taken modules, as soon as they are finalised by central administration. This will usually be after the initial publication of the teaching timetable for the relevant semester.
Reading list for COMPUTER SECURITY : http://aspire.surrey.ac.uk/modules/com3009
Programmes this module appears in
|Data Science for Health BSc (Hons)||1||Optional||A weighted aggregate mark of 40% is required to pass the module|
|Computer Science BSc (Hons)||1||Optional||A weighted aggregate mark of 40% is required to pass the module|
|Liberal Arts and Sciences BA (Hons)/BSc (Hons)||1||Optional||A weighted aggregate mark of 40% is required to pass the module|
|Computer and Internet Engineering BEng (Hons)||1||Optional||A weighted aggregate mark of 40% is required to pass the module|
|Computing and Information Technology BSc (Hons)||1||Optional||A weighted aggregate mark of 40% is required to pass the module|
|Computer and Internet Engineering MEng||1||Optional||A weighted aggregate mark of 40% is required to pass the module|
Please note that the information detailed within this record is accurate at the time of publishing and may be subject to change. This record contains information for the most up to date version of the programme / module for the 2019/0 academic year.