Accessibility statement

Security for Safety-Critical Systems (SESA) - COM00202M

« Back to module search

  • Department: Computer Science
  • Credit value: 10 credits
  • Credit level: M
  • Academic year of delivery: 2024-25

Module summary

The impact of security issues on the safety of systems continues to increase in importance as safety-related systems become more connected. Safety engineers often have a very limited understanding of cyber-security, and therefore find it difficult to include as part of safety assessments. This module provides an introduction to cyber-security for safety engineers, and in particular focuses on what students need to know to be able to effectively incorporate security issues into the safety engineering process.

Module will run

Occurrence Teaching period
A Semester 2 2024-25

Module aims

This module aims to provide students with an understanding of the interrelationships between safety and security. In particular the module focuses on how security threats can develop into hazardous events. The module is aimed at students with knowledge of safety engineering, but little or no understanding of security. The module therefore provides a broad awareness of security principles, measures and techniques.

Module learning outcomes

  • Identify and describe the safety implications of vulnerabilities in a system throughout the entire lifecycle.

  • Describe and justify approaches to the design of secure safety related systems

  • Justify trade-offs between security and safety requirements.

  • Assess the contribution of security to the safety properties of a system

  • Demonstrate how to provide an assurance case for the contribution of security to the safety of a system or service.

Indicative assessment

Task % of module mark
Essay/coursework 100

Special assessment rules

None

Indicative reassessment

Task % of module mark
Essay/coursework 100

Module feedback

Feedback is provided verbally throughout the module via practical sessions/seminars, and after the summative assessment as per University guidelines.

Indicative reading

**** Charles P. Pfleeger and Shari L. Pfleeger, Security in computing, Prentice Hall, 2007

**** Dieter Gollmann, Computer security, Wiley, 2006

**** Ross J. Anderson, Security engineering: a guide to build dependable distributed systems, Wiley, 2001



The information on this page is indicative of the module that is currently on offer. The University constantly explores ways to enhance and improve its degree programmes and therefore reserves the right to make variations to the content and method of delivery of modules, and to discontinue modules, if such action is reasonably considered to be necessary. In some instances it may be appropriate for the University to notify and consult with affected students about module changes in accordance with the University's policy on the Approval of Modifications to Existing Taught Programmes of Study.