Home / Course Resources Archive

Course Resources Archive

Postgraduate Module Descriptors 2012/13

COM476: Network Security

Module Title Network Security
Module Code COM476
Module Tutor David Wakeling
School Computing and Technology
CAT Points 15
Level of Study 7
Pre-requisites None
Co-requisites None
Restrictions None
Brief Description

This module is concerned with secure information storage at network end-points, and its secure transmission between them, in a way that can be assessed and audited for compliance with stated security objectives, policies, standards and processes. As such, it encompasses three roles commonly defined in the security community: Communications Security Officer, Auditor, and Accreditor.

It also incorporates four domains commonly recognized by the security industry: Telecommunications and Network Security; Cryptography; Security Operations; and Legal, Regulations, Investigation and Compliance.

Indicative Syllabus

Network technologies, network models, network protocols, network attacks and countermeasures, network encryption, intrusion prevention and

detection systems, malicious software. Encryption and decryption, types of cipher, symmetric and asymmetric key systems, message digests and signatures. Principle of least privilege, personnel and operations controls,

recording, monitoring and reporting, backup and recovery, automated testing, penetration testing, media management, due diligence. Data protection laws, data retention laws, data disclosure laws, computer misuse laws, intellectual property laws, investigations, ethics, international standards.

Learning Outcomes

 A student passing this module should be able to:

1.     critically evaluate different intrusion prevention and detection systems, and select one for deployment, drawing on best practice within the sector;

2.     critically evaluate the threat posed by different forms of malware, and select appropriate countermeasures;

3.     critically evaluate different encryption/decryption schemes, and select one for deployment, assessing short- and long-term implications;

4.     develop personnel and operational controls appropriate for an organisation, choosing from existing practices and developing new approaches where required;

5.     make informed judgements concerning the compliance of an information system with stated security objectives and applicable laws.

Learning and Teaching Activities Scheduled Contact Hours: 20
Independent Learning Hours: 130
Assessment (For further details see the Module Guide) 001: 50% Coursework: Individual, standard written: 2000 words or equivalent
002: 50% Written Exam: End of year, unseen, closed book: 2.00 hours
Special Assessment Requirements
Indicative Resources

The Library Catalogue contains full details of the current reading list for this module. Further details may also be found in the Module Guide.

An error has occurred. This application may no longer respond until reloaded. Reload 🗙