Malware is responsible for a great deal of damage in networked systems. In this module we aim to provide understanding and knowledge of how specific malware actually work and how they can be detected.
Module learning outcomes
At the end of the module the student will:
identify and analyse threats posed to current system security by malware.
understand the practical feasibility of specific attacks and evaluate the range of sophistication in current attacks.
identify and evaluate appropriate detection strategies.
understand approaches to detecting software vulnerabilities.
Indicative assessment
Task
% of module mark
Essay/coursework
100
Special assessment rules
None
Indicative reassessment
Task
% of module mark
Essay/coursework
100
Module feedback
Students will receive oral feedback during the classroom week, and written feedback on their assessment submission.
Indicative reading
M. Sikorski, Practical Malware Analysis: The Hands-on Guide to Dissecting Malicious Software, No Starch Press, 2012.
P. Szor, The Art of Computer Virus Research and Defense, Symantec Press, 2005.
S. Davidoff and J. Ham, Network Forensics: Tracking Hackers through Cyberspace, Prentice Hall, 2012.
R. Bejtlich, The Tao of Network Security Monitoring: Beyond Intrusion Detection, Addison Wesley, 2004.