COMPGA02 - Computer Security 2

Note: Whilst every effort is made to keep the syllabus and assessment records correct, the precise details must be checked with the lecturer(s).

Code
COMPGA02
Year
MSc
Prerequisites
N/A
Term
2
Taught By
Professor Mark Josephs (100%)
Aims
The module uses real-world examples to teach an analytical approach to computer security. The aims are to be able to identify security weaknesses in new situations, and to know tools and techniques by which to counter those weaknesses.
Learning Outcomes

Students will learn how to think critically and creatively about security. They will learn how, when and why to apply security technologies for the most benefit.


Content:

Threat-vulnerability-countermeasure paradigm (introduced in Chapter 1 of textbook);

17 case studies (Chapters 2 to 18) concerning

- Impersonation

- Program flaw

- Malicious code

- Keylogging

- Buffer overflow

- Device theft

- Rootkit

- Port scanning

- WiFi interception

- Satellite communication interception

- Man-in-the-middle

- Forgery

- Replay

- Denial of service

- Data modification

- P2P abuse

- Privacy violation

Method of Instruction:

Lecture presentations based on chapters of the recommended textbook, with discussion of associated exercises. The course is assessed by unseen written examination and a project, including a presentation session.

Assessment:

The course has the following assessment components:

  • Written Examination (2.5 hours, 80%)
  • Project_Presentation (0.5 hours, 20%)

To pass this course, students must:

  • Obtain an overall pass mark of 50% for all sections combined

The examination rubric is:
To be notified

Resources:

C.P. Pfleeger and S.L. Pfleeger, 'Analyzing Computer Security: A Threat / Vulnerability / Countermeasure Approach', Pearson.

http://proquest.safaribooksonline.com.libproxy.ucl.ac.uk/book/networking/security/9780132789493