SECURE SYSTEMS AND APPLICATIONS - 2022/3
Module code: COMM047
The module covers concepts and technologies for building secure and usable systems. The different lectures of the module focus on access control mechanisms, software and operating systems security, malware, threats and countermeasures for Web applications and databases, web and user authentication protocols, security of cyber-physical systems, human-centred security aspects such as social engineering and usability, security economics, privacy protection and trusted computing technologies.
Computer Science and Electronic Eng
ASGHAR Rizwan (CS & EE)
Number of Credits: 15
ECTS Credits: 7.5
Framework: FHEQ Level 7
JACs code: I100
Module cap (Maximum number of students): N/A
Overall student workload
Independent Learning Hours: 120
Lecture Hours: 20
Laboratory Hours: 10
Prerequisites / Co-requisites
Access control models and techniques (e.g. ACLs, mandatory access control, discretionary access control, role-based access control, group-based access control)
Software and operating systems security (incl. buffer overflows, privilege escalation attacks, rootkits)
Malware analysis (incl. threats and detection of various malware types, static/dynamic analysis) and countermeasures (e.g. antivirus technologies)
Web applications and database security (incl. XSS attacks (stored, reflected, DOM-based) and XSRF attacks on HTTP connections, penetration testing for Web applications, SQL injection attacks, countermeasures)
Web and user authentication protocols (e.g. using passwords, tokens, biometrics), incl. threats and countermeasures (e.g. password salting, authentication with two and more factors)
Privacy threats and protection (incl. online privacy, anonymous communications, privacy-enhancing technologies, cryptographic privacy protection, applications requiring privacy (e.g. social networks, e-voting))
Trusted computing technologies (computer platform authentication, attestation and integrity, and hardware enhanced root of trust)
Social engineering attacks (incl. phishing, pharming), human factors and usable security, security economics
Security of cyber-physical systems (incl. security of wireless communication standards such as WiFi, Bluetooth, GSM, RFID, NFC, security of sensor networks and mobile devices)
|Assessment type||Unit of assessment||Weighting|
The assessment strategy is designed to provide students with the opportunity to demonstrate that they have achieved the module learning outcomes.
Thus, the summative assessment for this module consists of:
An individual coursework assignment with a set of questions (incl. practical tasks) to cover several topics of the module and to address LO1, LO2 and LO3.
An individual coursework allowing students to apply what they learned to a realistic application, a real-world attack or a scenario where multiple features, such as security, privacy, trust and usability, need considering. It addresses LO1, LO2 and LO3 in an ad hoc setting.
Formative assessment and feedback
Lecture slides are used extensively in the lectures with each lecture consisting of a number of slides explaining the topic and showing the examples. Solutions to lab exercises are explained during the lab session and provided to the students.
- The aim of this module is to teach students to address various aspects that may arise in the development process of secure systems and applications and to privde background knowledge and understanding of selected technologies and mechanisms that are relevant in this context. The module will focus on technical challenges and concepts while also covering a range of security-related concepts of less technical nature such as consideration of human factors and economics of security.
|1||Understand a variety of challenges in the development of secure and usable systems||KC|
|2||Understand the functionality and goals of selected technologies and mechanisms that can aid the development process||KCT|
|3||Experience selected technologies and mechanisms in practice||KPT|
C - Cognitive/analytical
K - Subject knowledge
T - Transferable skills
P - Professional/Practical skills
Methods of Teaching / Learning
The learning and teaching strategy is designed to:
- Help students understand a range of security aspects that may arise in the development process of secure and usable systems
- Explain selected concepts and techniques for building secure systems and applications
- Explain the importance of considering human factors for security and their impact
- Enable students to apply selected technologies and mechanisms in practice
The learning and teaching methods include:
- Lectures (10 weeks at 2h) using detailed lecture slides to gauge the students’ understanding
- Labs (10 weeks at 1h) using computing labs, exercise sheets and their solutions.
Students will be expected to distribute the remaining workload on self-study, preparation for lectures and labs, preparation and submission of coursework assignments.
Indicated Lecture Hours (which may also include seminars, tutorials, workshops and other contact time) are approximate and may include in-class tests where one or more of these are an assessment on the module. In-class tests are scheduled/organised separately to taught content and will be published on to student personal timetables, where they apply to taken modules, as soon as they are finalised by central administration. This will usually be after the initial publication of the teaching timetable for the relevant semester.
Upon accessing the reading list, please search for the module using the module code: COMM047
Programmes this module appears in
|Information Security MSc||2||Compulsory||A weighted aggregate mark of 50% is required to pass the module|
Please note that the information detailed within this record is accurate at the time of publishing and may be subject to change. This record contains information for the most up to date version of the programme / module for the 2022/3 academic year.