Network Security - COM00056H
- Department: Computer Science
- Credit value: 20 credits
- Credit level: H
-
Academic year of delivery: 2024-25
- See module specification for other years: 2023-24
Module summary
Network Security (NETS): This module covers the basic concepts of cyber security, how these are modelled, threat models, and the mechanisms to enforce security policies.
Module will run
Occurrence | Teaching period |
---|---|
A | Semester 1 2024-25 |
Module aims
This module aims to provide a broad knowledge of network and system security, addressing threats over a range of network layers and detailing corresponding defensive countermeasures and protocols. The module will cover the basic concepts of cyber security (confidentiality, integrity and availability), how these are modelled, threat models (adversary capabilities and goals), and basic control mechanisms to enforce security policies (e.g. access control). Students will learn to understand network security, threats, and the mechanisms that have been developed to counter them. It explores a range of different networked systems, the main network attacks, and their defence mechanisms.
Module learning outcomes
By the end of the module the students will be able to:
- Describe the fundamental concepts of cyber security in systems and networks
- Identify security strengths & weaknesses in network mechanisms
- Identify major threats and attacks in systems and networks under various scenarios, architectures, and threat models
- Propose control solutions for network security
- Assess the relative merits of different solution approaches in various security-related contexts
Indicative assessment
Task | % of module mark |
---|---|
Essay/coursework | 100 |
Special assessment rules
None
Indicative reassessment
Task | % of module mark |
---|---|
Essay/coursework | 100 |
Module feedback
Feedback is provided through work in practical sessions, discussion in seminars, and after each assessment as per normal University guidelines.
Indicative reading
Sherri Davidoff, Jonathan Ham, Network Forensics: Tracking Hackers Through Cyberspace, Prentice Hall, 2012
Kevin R Fall, W Richard Stevens, TCP/IP Illustrated, Volume 1: The protocols, Addison Wesley, 2012
Andrew Tannenbaum, Computer Networks, Prentice Hall, 2002