Show/hide contentOpenClose All
Curricular information is subject to change
On completion of this module, students should have gained an overall introduction to the theory and applications of cryptography - the science of secrecy; access control; security protocols and security in software. They will gain an understanding of the fundamental concepts concerning computer and network security; have an understanding of the mathematics and the algorithms behind several well known cryptosystems; conceptually identify vulnerabilities, including recent attacks, involving the Internet of Things; conceptually describe countermeasures for Internet of Things devices; develop critical thinking skills and formal techniques to verify the security protocols.
Introduction
Crypto: Crypto Basics; Symmetric Key Crypto; Public Key Crypto; Hash Functions and other topics
Access Control: Authentication; Authorization
Protocols: Simple Authentication Protocols; Real World Security Protocols; Weaknesses and Attacks
Software: Security Vulnerabilities and Malware
Student Effort Type | Hours |
---|---|
Lectures | 30 |
Practical | 26 |
Autonomous Student Learning | 80 |
Total | 136 |
Not applicable to this module.
Remediation Type | Remediation Timing |
---|---|
In-Module Resit | Prior to relevant Programme Exam Board |
• Feedback individually to students, on an activity or draft prior to summative assessment
• Feedback individually to students, post-assessment
• Online automated feedback
• Peer review activities
• Self-assessment activities
The grading scheme used will be Standard Conversion Grade Scale* 40% Pass (70% = A-)
Name | Role |
---|---|
Dr Anca Delia Jurcut | Lecturer / Co-Lecturer |
Shahrin Chowdhury | Tutor |
Pasika Ranaweera | Tutor |
Furqan Rustam | Tutor |