Course Resources Archive
COM476: Network Security
Module Title | Network Security |
---|---|
Module Code | COM476 |
Module Tutor | David Wakeling |
School | Computing and Technology |
CAT Points | 15 |
Level of Study | 7 |
Pre-requisites | None |
Co-requisites | None |
Restrictions | None |
Brief Description | This module is concerned with secure information storage at network end-points, and its secure transmission between them, in a way that can be assessed and audited for compliance with stated security objectives, policies, standards and processes. As such, it encompasses three roles commonly defined in the security community: Communications Security Officer, Auditor, and Accreditor. It also incorporates four domains commonly recognized by the security industry: Telecommunications and Network Security; Cryptography; Security Operations; and Legal, Regulations, Investigation and Compliance. |
Indicative Syllabus | Network technologies, network models, network protocols, network attacks and countermeasures, network encryption, intrusion prevention and detection systems, malicious software. Encryption and decryption, types of cipher, symmetric and asymmetric key systems, message digests and signatures. Principle of least privilege, personnel and operations controls, recording, monitoring and reporting, backup and recovery, automated testing, penetration testing, media management, due diligence. Data protection laws, data retention laws, data disclosure laws, computer misuse laws, intellectual property laws, investigations, ethics, international standards. |
Learning Outcomes | A student passing this module should be able to: 1. critically evaluate different intrusion prevention and detection systems, and select one for deployment, drawing on best practice within the sector; 2. critically evaluate the threat posed by different forms of malware, and select appropriate countermeasures; 3. critically evaluate different encryption/decryption schemes, and select one for deployment, assessing short- and long-term implications; 4. develop personnel and operational controls appropriate for an organisation, choosing from existing practices and developing new approaches where required; 5. make informed judgements concerning the compliance of an information system with stated security objectives and applicable laws. |
Learning and Teaching Activities | Scheduled Contact Hours: 20 Independent Learning Hours: 130 |
Assessment (For further details see the Module Guide) | 001: 50% Coursework: Individual, standard written: 2000 words or equivalent 002: 50% Written Exam: End of year, unseen, closed book: 2.00 hours |
Special Assessment Requirements | |
Indicative Resources | The Library Catalogue contains full details of the current reading list for this module. Further details may also be found in the Module Guide. |