SECURE SYSTEMS AND APPLICATIONS - 2021/2
Module code: COMM047
In light of the Covid-19 pandemic, and in a departure from previous academic years and previously published information, the University has had to change the delivery (and in some cases the content) of its programmes, together with certain University services and facilities for the academic year 2020/21.
These changes include the implementation of a hybrid teaching approach during 2020/21. Detailed information on all changes is available at: https://www.surrey.ac.uk/coronavirus/course-changes. This webpage sets out information relating to general University changes, and will also direct you to consider additional specific information relating to your chosen programme.
Prior to registering online, you must read this general information and all relevant additional programme specific information. By completing online registration, you acknowledge that you have read such content, and accept all such changes.
The module covers concepts and technologies for building secure and usable systems. The different lectures of the module focus on access control mechanisms, software and operating systems security, malware, threats and countermeasures for Web applications and databases, web and user authentication protocols, security of cyber-physical systems, human-centred security aspects such as social engineering and usability, security economics, privacy protection and trusted computing technologies.
CHEN Liqun (Computer Sci)
Number of Credits: 15
ECTS Credits: 7.5
Framework: FHEQ Level 7
JACs code: I100
Module cap (Maximum number of students): N/A
Prerequisites / Co-requisites
Access control models and techniques (e.g. ACLs, mandatory access control, discretionary access control, role-based access control, group-based access control)
Software and operating systems security (incl. buffer overflows, privilege escalation attacks, rootkits)
Malware analysis (incl. threats and detection of various malware types, static/dynamic analysis) and countermeasures (e.g. antivirus technologies)
Web applications and database security (incl. XSS attacks (stored, reflected, DOM-based) and XSRF attacks on HTTP connections, penetration testing for Web applications, SQL injection attacks, countermeasures)
Web and user authentication protocols (e.g. using passwords, tokens, biometrics), incl. threats and countermeasures (e.g. password salting, authentication with two and more factors)
Privacy threats and protection (incl. online privacy, anonymous communications, privacy-enhancing technologies, cryptographic privacy protection, applications requiring privacy (e.g. social networks, e-voting))
Trusted computing technologies (computer platform authentication, attestation and integrity, and hardware enhanced root of trust)
Social engineering attacks (incl. phishing, pharming), human factors and usable security, security economics
Security of cyber-physical systems (incl. security of wireless communication standards such as WiFi, Bluetooth, GSM, RFID, NFC, security of sensor networks and mobile devices)
|Assessment type||Unit of assessment||Weighting|
|Coursework||COURSEWORK I (INDIVIDUAL)||50|
|Coursework||COURSEWORK II (INDIVIDUAL)||30|
|School-timetabled exam/test||IN-SEMESTER TEST (INDIVIDUAL) (1 HOUR)||20|
The assessment strategy is designed to provide students with the opportunity to demonstrate that they have achieved the module learning outcomes.
Thus, the summative assessment for this module consists of:
An individual coursework assignment with a set of questions (incl. practical tasks) to cover several topics of the module and to address LO1, LO2 and LO3.
An individual coursework allowing students to apply what they learned to a realistic application, a real-world attack or a scenario where both security and usability need considering. This assessment will mainly cover human factors in cyber security and applications/attacks/scenarios can come from any part of the module. It addresses LO1, LO2 and LO3 in an ad hoc setting.
An in-semester test with a set of questions on different topics (in particular, on user authentication, privacy, trusted computing and cyber-physical systems security) that students are required to answer. The in-semester test will address LO1 and LO2.
Formative assessment and feedback
Lecture slides are used extensively in the lectures with each lecture consisting of a number of slides explaining the topic and showing the examples. Solutions to lab exercises are explained during the lab session and provided to the students.
- The aim of this module is to teach students to address various aspects that may arise in the development process of secure systems and applications and to privde background knowledge and understanding of selected technologies and mechanisms that are relevant in this context. The module will focus on technical challenges and concepts while also covering a range of security-related concepts of less technical nature such as consideration of human factors and economics of security.
|1||Understand a variety of challenges in the development of secure and usable systems||KC|
|2||Understand the functionality and goals of selected technologies and mechanisms that can aid the development process||KCT|
|3||Experience selected technologies and mechanisms in practice||KPT|
C - Cognitive/analytical
K - Subject knowledge
T - Transferable skills
P - Professional/Practical skills
Overall student workload
Lecture Hours: 33
Laboratory Hours: 11
Methods of Teaching / Learning
The learning and teaching strategy is designed to:
- Help students understand a range of security aspects that may arise in the development process of secure and usable systems
- Explain selected concepts and techniques for building secure systems and applications
- Explain the importance of considering human factors for security and their impact
- Enable students to apply selected technologies and mechanisms in practice
The learning and teaching methods include:
- Lectures (10 weeks at 2h) using detailed lecture slides to gauge the students’ understanding
- Labs (10 weeks at 2h) using computing labs, exercise sheets and their solutions.
Students will be expected to distribute the remaining workload on self-study, preparation for lectures and labs, preparation and submission of coursework assignments.
Indicated Lecture Hours (which may also include seminars, tutorials, workshops and other contact time) are approximate and may include in-class tests where one or more of these are an assessment on the module. In-class tests are scheduled/organised separately to taught content and will be published on to student personal timetables, where they apply to taken modules, as soon as they are finalised by central administration. This will usually be after the initial publication of the teaching timetable for the relevant semester.
Upon accessing the reading list, please search for the module using the module code: COMM047
Programmes this module appears in
|Information Security MSc||2||Compulsory||A weighted aggregate mark of 50% is required to pass the module|
Please note that the information detailed within this record is accurate at the time of publishing and may be subject to change. This record contains information for the most up to date version of the programme / module for the 2021/2 academic year.