Accessibility statement

Security for Safety-Critical Systems (SESA) - COM00202M

« Back to module search

  • Department: Computer Science
  • Credit value: 10 credits
  • Credit level: M
  • Academic year of delivery: 2024-25

Module summary

The impact of security issues on the safety of systems continues to increase in importance as safety-related systems become more connected. Safety engineers often have a very limited understanding of cyber-security, and therefore find it difficult to include as part of safety assessments. This module provides an introduction to cyber-security for safety engineers, and in particular focuses on what students need to know to be able to effectively incorporate security issues into the safety engineering process.

Module will run

Occurrence Teaching period
A Semester 2 2024-25

Module aims

This module aims to provide students with an understanding of the interrelationships between safety and security. In particular the module focuses on how security threats can develop into hazardous events. The module is aimed at students with knowledge of safety engineering, but little or no understanding of security. The module therefore provides a broad awareness of security principles, measures and techniques.

Module learning outcomes

  • Identify and describe the implications of vulnerabilities in a system, using this to inform and challenge project decisions.
  • Assess the credibility of a proposed design, make justifiable trade-offs between security and safety requirements.
  • Assess the safety properties of a proposed system with consideration of security threats and vulnerabilities.
  • Develop an assurance case for the safety and security of a system or service.

Indicative assessment

Task % of module mark
Essay/coursework 100

Special assessment rules

None

Indicative reassessment

Task % of module mark
Essay/coursework 100

Module feedback

Feedback is provided verbally throughout the module via practical sessions/seminars, and after the summative assessment as per University guidelines.

Indicative reading

**** Charles P. Pfleeger and Shari L. Pfleeger, Security in computing, Prentice Hall, 2007

**** Dieter Gollmann, Computer security, Wiley, 2006

**** Ross J. Anderson, Security engineering: a guide to build dependable distributed systems, Wiley, 2001



The information on this page is indicative of the module that is currently on offer. The University constantly explores ways to enhance and improve its degree programmes and therefore reserves the right to make variations to the content and method of delivery of modules, and to discontinue modules, if such action is reasonably considered to be necessary. In some instances it may be appropriate for the University to notify and consult with affected students about module changes in accordance with the University's policy on the Approval of Modifications to Existing Taught Programmes of Study.