System Security - CO899

Looking for a different module?

Module delivery information

Location Term Level1 Credits (ECTS)2 Current Convenor3 2020 to 2021
(version 2)
Spring 7 15 (7.5) PROF J Hernandez Castro checkmark-circle


The module looks at federated identity management, privacy protection, viruses and worms, hacking, secure architectures, formal verification methods, e-mail security, secure software development methods and tools.


This module appears in the following module collections.

Contact hours

Total contact hours: 34
Private study hours: 116
Total study hours: 150

Method of assessment

13.1 Main assessment methods
Presentation (10%)
Written assessment (40%)
Examination, 2 hours (50%)

13.2 Reassessment methods
Like for like.

Indicative reading

Peter Szor, The Art of Computer Virus Research and Defense, Symantec Press, 2005.
Ross Anderson, Security Engineering, Wiley & Sons, 2001.
Bruce Schneier, Applied Cryptography: Protocols, Algorithms, and Source Code in C, John Wiley & Sons, 1996.
Niels Ferguson, Bruce Schneier and Tadayoshi Kohno. Cryptography engineering. John Wiley & Sons, 2010.
Jamie Bartlett, The Dark Net. Random House, 2014.
Jessica Fridrich, Steganography in digital media: principles, algorithms, and applications, Cambridge University Press, 2009.
Peter Wayner. Disappearing Cryptography, Massachusetts, AP Professional, 1996.
Michael Sikorski and Andrew Honig, Practical malware analysis: the hands-on guide to dissecting malicious software, No Starch Press, 2012.
Bill Nelson, Amelia Phillips, and Christopher Steuart, Guide to computer forensics and investigations. Cengage Learning, 2015.
Eoghan Casey, Digital evidence and computer crime: Forensic science, computers, and the internet. Academic Press, 2011.

See the library reading list for this module (Canterbury)

Learning outcomes

8. The intended subject specific learning outcomes.
On successfully completing the module students will be able to:
8.1 Demonstrate knowledge of a broad variety of advanced topics related to computer systems security.
8.2 Demonstrate awareness of the importance of taking a systems wide approach to achieving and maintaining information security.
8.3 Demonstrate an advanced understanding of the motivation, design and operation of modern systems for encryption, authentication, authorisation and identification.
8.4 Apply modern software design principles to model and develop solutions to complex secure systems problems.
8.5 Select and employ appropriate development tools for modern secure systems.
8.6 Use appropriate software tools, techniques and packages to produce and develop security systems.
8.7 Undertake an investigation into areas covered by this module and report on their findings.

9. The intended generic learning outcomes.
On successfully completing the module students will be able to:
9.1 Demonstrate the ability for critical thinking, reasoning and reflection.
9.2 Produce a specification of the operation of a complex system based on an understanding of the component parts.
9.3 Undertake critical appraisal of a candidate system design and reflect upon its merits.
9.4 Study independently and make appropriate use of relevant resources.
9.5 Demonstrate personal and interpersonal skills, and work as a member of a team.
9.6 Communicate effectively (in writing and verbally).
9.7 Learn effectively for the purpose of continuing professional development.
9.8 Manage time and resources within a potentially complex problem domain.
9.9 Make effective use of general IT facilities including information retrieval skills.


  1. Credit level 7. Undergraduate or postgraduate masters level module.
  2. ECTS credits are recognised throughout the EU and allow you to transfer credit easily from one university to another.
  3. The named convenor is the convenor for the current academic session.
Back to top

University of Kent makes every effort to ensure that module information is accurate for the relevant academic session and to provide educational services as described. However, courses, services and other matters may be subject to change. Please read our full disclaimer.