Accessibility statement

Information & Network Security - COM00045H

« Back to module search

  • Department: Computer Science
  • Credit value: 20 credits
  • Credit level: H
  • Academic year of delivery: 2022-23

Module summary

This module covers the basic concepts of cyber security, how these are modelled, threat models, and the mechanisms to enforce security policies.

Module will run

Occurrence Teaching period
A Autumn Term 2022-23 to Spring Term 2022-23

Module aims

This module will cover the basic concepts of cyber security (confidentiality, integrity and availability), how these are modelled (importance of identity, trust, reputation), threat models (adversary capabilities and goals), and basic control mechanisms to enforce security policies (e.g. access control). Students will learn to understand network security, threats, and the mechanisms that have been developed to counter them. It explores a range of different networked systems, the main network attacks, and their defence mechanisms.

Module learning outcomes

  • Be able to assess the relative merits of different solution approaches in various security-related contexts.

  • Understand and explain the importance of identity, trust, reputation and related concepts, why they are needed and how they are implemented in modern-day systems.

  • Be able to identify major threats to identity, trust and reputation in a variety of system types.

  • Understand and explain the basic technical components of network security, and associated possible attacks.

Indicative assessment

Task % of module mark
Essay/coursework 50
Essay/coursework 50

Special assessment rules

None

Indicative reassessment

Task % of module mark
Essay/coursework 50
Essay/coursework 50

Module feedback

Feedback is provided through work in practical sessions, discussion in seminars, and after each assessment as per normal University guidelines.

Indicative reading

Sherri Davidoff, Jonathan Ham, Network Forensics: Tracking Hackers Through Cyberspace, Prentice Hall, 2012

Kevin R Fall, W Richard Stevens, TCP/IP Illustrated, Volume 1: The protocols, Addison Wesley, 2012

Andrew Tannenbaum, Computer Networks, Prentice Hall, 2002



The information on this page is indicative of the module that is currently on offer. The University constantly explores ways to enhance and improve its degree programmes and therefore reserves the right to make variations to the content and method of delivery of modules, and to discontinue modules, if such action is reasonably considered to be necessary. In some instances it may be appropriate for the University to notify and consult with affected students about module changes in accordance with the University's policy on the Approval of Modifications to Existing Taught Programmes of Study.