Accessibility statement

Network Security - COM00056H

« Back to module search

  • Department: Computer Science
  • Credit value: 20 credits
  • Credit level: H
  • Academic year of delivery: 2024-25
    • See module specification for other years: 2023-24

Module summary

Network Security (NETS): This module covers the basic concepts of cyber security, how these are modelled, threat models, and the mechanisms to enforce security policies.

Module will run

Occurrence Teaching period
A Semester 1 2024-25

Module aims

This module aims to provide a broad knowledge of network and system security, addressing threats over a range of network layers and detailing corresponding defensive countermeasures and protocols. The module will cover the basic concepts of cyber security (confidentiality, integrity and availability), how these are modelled, threat models (adversary capabilities and goals), and basic control mechanisms to enforce security policies (e.g. access control). Students will learn to understand network security, threats, and the mechanisms that have been developed to counter them. It explores a range of different networked systems, the main network attacks, and their defence mechanisms.

Module learning outcomes

By the end of the module the students will be able to:

  1. Describe the fundamental concepts of cyber security in systems and networks
  2. Identify security strengths & weaknesses in network mechanisms
  3. Identify major threats and attacks in systems and networks under various scenarios, architectures, and threat models
  4. Propose control solutions for network security
  5. Assess the relative merits of different solution approaches in various security-related contexts

Indicative assessment

Task % of module mark
Essay/coursework 100

Special assessment rules

None

Indicative reassessment

Task % of module mark
Essay/coursework 100

Module feedback

Feedback is provided through work in practical sessions, discussion in seminars, and after each assessment as per normal University guidelines.

Indicative reading

Sherri Davidoff, Jonathan Ham, Network Forensics: Tracking Hackers Through Cyberspace, Prentice Hall, 2012

Kevin R Fall, W Richard Stevens, TCP/IP Illustrated, Volume 1: The protocols, Addison Wesley, 2012

Andrew Tannenbaum, Computer Networks, Prentice Hall, 2002



The information on this page is indicative of the module that is currently on offer. The University constantly explores ways to enhance and improve its degree programmes and therefore reserves the right to make variations to the content and method of delivery of modules, and to discontinue modules, if such action is reasonably considered to be necessary. In some instances it may be appropriate for the University to notify and consult with affected students about module changes in accordance with the University's policy on the Approval of Modifications to Existing Taught Programmes of Study.