COMPUTER SECURITY - 2022/3
Module code: COM3009
In light of the Covid-19 pandemic the University has revised its courses to incorporate the ‘Hybrid Learning Experience’ in a departure from previous academic years and previously published information. The University has changed the delivery (and in some cases the content) of its programmes. Further information on the general principles of hybrid learning can be found at: Hybrid learning experience | University of Surrey.
We have updated key module information regarding the pattern of assessment and overall student workload to inform student module choices. We are currently working on bringing remaining published information up to date to reflect current practice during the academic year 2021/22.
This means that some information within the programme and module catalogue will be subject to change. Current students are invited to contact their Programme Leader or Academic Hive with any questions relating to the information available.
The rapid development of the Internet, and its increased use for business critical and financial transactions, have made understanding of security issues more important than ever before. This module covers the basic principles behind computer security.
SCHNEIDER Steve (Computer Sci)
Number of Credits: 15
ECTS Credits: 7.5
Framework: FHEQ Level 6
JACs code: I100
Module cap (Maximum number of students): N/A
Overall student workload
Independent Learning Hours: 104
Laboratory Hours: 12
Guided Learning: 12
Captured Content: 22
Prerequisites / Co-requisites
The module is divided into the following areas:
- Introduction to security issues and security evaluation
- Introduction to cryptography
- Symmetric and Public Key schemes
- Modern symmetric cryptographic algorithms, e.g., Block Cipher Primitives, AES
- Asymmetric encryption
- Public Key Algorithms, e.g., RSA/ElGamal
- Attacking protocols
- Introduction to Access Control
- Introduction to Authentication in Distributed Systems
- Current Technologies in Security, e.g., VPN, firewalls
|Assessment type||Unit of assessment||Weighting|
|Coursework||INDIVIDUAL COURSEWORK 1||50|
|Coursework||INDIVIDUAL COURSEWORK 2||50|
The assessment strategy is designed to provide students with the opportunity to demonstrate their achievement of the learning outcomes.
Learning outcomes 1 and 2 are assessed by the coursework, and also by the examination. Learning outcomes 3 and 4 are assessed by the examination.
Thus, the summative assessment for this module consists of:
· Grades for the coursework item against previously published assessment criteria
· Coursework is 20 hours work
· Two hour examination.
Formative assessment and feedback
Verbal feedback is given in lab sessions on the students attempts at the lab exercises and theoretical questions. Written formative feedback is also given on the coursework. Use of the electronic voting handsets in lectures also provides formative feedback for the students.
- develop the students understanding of computer security and its fundamental principles
- focus on the details of cryptographic mechanisms and how they are used to achieve security
- develop an understanding of the difficulties involved in achieving security and the approaches taken in analysing security solutions
- Introduce tools for exploring cryptography and for protocol analysis
- Introduce aspects of access control for information protection
|1||Explain and demonstrate an understanding of the main cryptographic primitives and algorithms||KCT|
|2||Analyse and model cryptographic protocols||KC|
|3||Explain the basic principles of security||KT|
|4||Describe current trends in security threats and countermeasures||P|
C - Cognitive/analytical
K - Subject knowledge
T - Transferable skills
P - Professional/Practical skills
Methods of Teaching / Learning
The learning and teaching strategy is designed to:
Provide students with the knowledge, skills and practical experience covering the module aims and learning outcomes
The learning and teaching methods include:
For each teaching week there will be
- 2 hours of lectures, including use of electronic voting
- 2 hour of labs
- There will also be a revision session to support the module.
Indicated Lecture Hours (which may also include seminars, tutorials, workshops and other contact time) are approximate and may include in-class tests where one or more of these are an assessment on the module. In-class tests are scheduled/organised separately to taught content and will be published on to student personal timetables, where they apply to taken modules, as soon as they are finalised by central administration. This will usually be after the initial publication of the teaching timetable for the relevant semester.
Upon accessing the reading list, please search for the module using the module code: COM3009
Programmes this module appears in
|Computer Science BSc (Hons)||1||Optional||A weighted aggregate mark of 40% is required to pass the module|
|Computing and Information Technology BSc (Hons)||1||Optional||A weighted aggregate mark of 40% is required to pass the module|
|Computer and Internet Engineering BEng (Hons)||1||Optional||A weighted aggregate mark of 40% is required to pass the module|
|Computer and Internet Engineering MEng||1||Optional||A weighted aggregate mark of 40% is required to pass the module|
Please note that the information detailed within this record is accurate at the time of publishing and may be subject to change. This record contains information for the most up to date version of the programme / module for the 2022/3 academic year.