COMP47880 Network Security

Academic Year 2022/2023

This module discusses the underlying the basic principles, methods, tools, and techniques used for network and communication security. Practical examples of security problems and principles for countermeasures are also discussed. In addition, the module will also survey modern and emerging cryptographic and other tools used to provide security and review how these tools are utilized in protocols and applications. Thus, this module focuses on providing in-depth knowledge on the field of network and communication security, with an emphasis on modern techniques used in the real world. In-depth knowledge about possible threats, security requirements, and countermeasures is important for the network security specialist to design secure and reliable future network systems.

Show/hide contentOpenClose All

Curricular information is subject to change

Learning Outcomes:

Upon completion of this module, students should be able to;
-Obtain an extensive knowledge of both the principles and the practice of modern network and communication security.
-Understand the in-depth understanding of computer and wireless network concepts
-Understand the issues to be addressed by network security related to both computer and wireless networks
-Understand current issues with network security and the state-of-the-art attack detection and prevention mechanisms.
-Learn about the network security of practical applications (i.e., telecom networks, cloud computing, IoT) and secure network communications techniques used for these applications around the globe.
-Learn about emerging network and communication security techniques (i.e., network softwarization, quantum computing, cloud-native technologies, AI, and Blockchain)

Indicative Module Content:

The module is divided into two parts.

In the first part, we review computer and wireless networks, including:
-Internet/ Transport layer protocols, scalable routing, multicasting, Flow control, congestion control, routing
-Wireless Network Concepts/Cellular (LTE) and 5G Networks
-Local area networks/ Wireless LAN/
-Network Sotwarization Concepts(i.e. SDN/NFV) / Cloud Computing

In the second part, we cover the following topics
-Network attacks, e.g. DDoS attacks, Malware, worm, and virus propagation
-Protection mechanisms such as firewalls, network intrusion detection, secure routing protocols
-Physical Layer Security / LAN Security, Resilient Network Topologies, Securing Distributed Algorithms
-Security of Internet Architectures, Web and DNS security
-New security technologies related to next-generation wireless and cellular networks and cellular and wireless networks.
-Emerging topics; Blockchain, Quantum Cryptography/ Communication, AI for Security, 6G Security

Student Effort Hours: 
Student Effort Type Hours




Project Supervision


Autonomous Student Learning




Approaches to Teaching and Learning:
Lectures; practical sessions; formative practical exercises; practical assignments, Projects.

Requirements, Exclusions and Recommendations

Not applicable to this module.

Module Requisites and Incompatibles
Not applicable to this module.
Assessment Strategy  
Description Timing Open Book Exam Component Scale Must Pass Component % of Final Grade
Continuous Assessment: Continuous assessment (Including One project, In-class Lecture, Paper Summary assessment ): (70%) Throughout the Trimester n/a Graded No


Class Test: End-of-term examination or In Class Test (30%)
2 hour End of Trimester Exam n/a Graded No


Carry forward of passed components
Resit In Terminal Exam
Spring No
Please see Student Jargon Buster for more information about remediation types and timing. 
Feedback Strategy/Strategies

• Group/class feedback, post-assessment

How will my Feedback be Delivered?

Not yet recorded.

Name Role
Dr Liliana Pasquale Lecturer / Co-Lecturer