Learning Outcomes:
On completion of this module, students should have gained an overall introduction to the theory and applications of cryptography - the science of secrecy; access control; security protocols and security in software. They will gain an understanding of the fundamental concepts concerning computer and network security; have an understanding of the mathematics and the algorithms behind several well known cryptosystems; conceptually identify vulnerabilities, including recent attacks, involving the Internet of Things; conceptually describe countermeasures for Internet of Things devices; develop critical thinking skills and formal techniques to verify the security protocols.
Indicative Module Content:
Introduction
Crypto: Crypto Basics; Symmetric Key Crypto; Public Key Crypto; Hash Functions and other topics
Access Control: Authentication; Authorization
Protocols: Simple Authentication Protocols; Real World Security Protocols; Weaknesses and Attacks
Software: Security Vulnerabilities and Malware