Introduction to Cyber Security - COMP5580

Looking for a different module?

Module delivery information

Location Term Level1 Credits (ECTS)2 Current Convenor3 2022 to 2023
Canterbury
Spring Term 5 15 (7.5) Jason Nurse checkmark-circle

Overview

Cyber security has always been an important aspect of computing systems but its importance has increased greatly in recent years. The curriculum covers areas where cyber security is of major importance, but have different security requirements and may be exposed to different threats and attacks. It also covers techniques and mechanisms used to secure computer systems and data to meet those requirements and protect them. The areas looked at include computer operating systems (and increasingly, distributed operating systems), distributed applications (such as electronic commerce over the Internet), embedded systems (ranging from smart cards to large industrial plant and telecommunications systems), and users. The techniques and mechanisms looked at include cryptography, authentication & authorisation, and access control. Furthermore, the curriculum integrates the legal, ethical, and professional perspectives, for instance, to address concerns about data security, privacy, and societal impact of computing systems.

Details

Contact hours

Total contact hours: 30
Private study hours: 120
Total study hours: 150

Method of assessment

Main assessment methods
2 hour written exam - 50%
Coursework - 50%

13.2 Reassessment methods
Like for like.

Indicative reading

Anderson, R., "Security Engineering: A Guide to Building Dependable Distributed Systems" 2nd ed., 2008, Wiley.
BCS Code of Conduct, https://www.bcs.org.uk/
Pfleeger, C.P., Pfleeger, S.L., and Marulies, J., "Security in Computing", 5th ed., 2015, Prentice Hall.
Cranor, L.F. & Garfinkel, S., "Security and Usability: Designing Secure Systems that
People Can Use" 2005, O'Reilly Media.
Stallings, W., "Cryptography and Network Security: Principles and Practice" 7th ed., 2017, Pearson.
Ferguson, N., Kohno, T., and Schneier, B. "Cryptography Engineering: Design Principles and Practical Applications", 1st ed., 2010, John Wiley & Sons.
Garfinkel, S. and Lipford, H.R., "Usable Security: History, Themes, and Challenges", 2014, Morgan & Claypool Publishers.

Learning outcomes

8. The intended subject specific learning outcomes.
On successfully completing the module students will be able to:
8.1 understand foundational security principles and core technology to enforce and maintain security of data and computer systems;
8.2 make informed choices of the appropriate security measures to put into place for a given network and/or operating system;
8.3 understand the importance of putting security into the context of a larger system including hardware, software, and human users;
8.4 understand how cryptography can be used for providing security within applications;
8.5 understand and implement selected fundamental algorithms used in cryptography.

9. The intended generic learning outcomes.
On successfully completing the module students will be:
9.1 able to analyse a problem specification and to design and implement a solution.
9.2 aware of the relevant professional, ethical and legal issues in this subject area.
9.3 able to apply relevant fundamental mathematical techniques.
9.4 able to develop their own time management and organisational skills.

Notes

  1. Credit level 5. Intermediate level module usually taken in Stage 2 of an undergraduate degree.
  2. ECTS credits are recognised throughout the EU and allow you to transfer credit easily from one university to another.
  3. The named convenor is the convenor for the current academic session.
Back to top

University of Kent makes every effort to ensure that module information is accurate for the relevant academic session and to provide educational services as described. However, courses, services and other matters may be subject to change. Please read our full disclaimer.