Fundamentals of Security - 2020 entry
| MODULE TITLE | Fundamentals of Security | CREDIT VALUE | 15 |
|---|---|---|---|
| MODULE CODE | ECMM462 | MODULE CONVENER | Diego Marmsoler (Coordinator) |
| DURATION: TERM | 1 | 2 | 3 |
|---|---|---|---|
| DURATION: WEEKS | 11 |
| Number of Students Taking Module (anticipated) | 15 |
|---|
Our modern life depends on the security of computerised systems ranging from social aspects (e.g. phishing) to technical and mathematical aspects (e.g. access control, encryption). In this module, you will learn the fundamental concepts required for starting a career in various areas related to security (e.g. cyber security, data security, information security, computer security). You will learn core security concepts (e.g. authenticity, confidentiality, anonymity, privacy) and core technologies (e.g. encryption, authentication, authorisation). Moreover, you will learn the basic attacks on security systems and approaches for reasoning about the correctness of security techniques.
Pre-requisites: none
Co-requisites: none
The aim of this module to create awareness of the need for security and privacy in modern life, and to introduce the fundamental security and privacy mechanism used in modern computer systems. We will explore topics such as fundamentals of computer security, technology and principles of network security, cryptography, authentication and digital signatures, access control mechanisms, privacy, and anonymisation.
In more detail, the aims of the module are to give you an understanding of
- the different types of security threats and their effect on data privacy and business functions
- the fundamental principles of information security
- the fundamental principles of cryptography
- the fundamental principles of secure and privacy-aware data processing
|
Module Specific Skills and Knowledge: |
|||||||||||||||||||
|
1 |
Explain the fundamental information/cyber security concepts |
||||||||||||||||||
|
2 |
Select the appropriate security controls for a cyber system |
||||||||||||||||||
|
3 |
Select the appropriate privacy controls for a cyber system |
||||||||||||||||||
|
Discipline Specific Skills and Knowledge: |
|||||||||||||||||||
|
3 |
Understand the role of cyber information security in online commercial, financial and other activities |
||||||||||||||||||
|
4 |
Understand the security and privacy guarantees and the limitations of modern security and privacy controls |
||||||||||||||||||
|
Personal and Key Transferable/ Employment Skills and Knowledge: |
|||||||||||||||||||
|
5 |
Assessing and understanding the limitations of technology |
||||||||||||||||||
|
6 |
Understand risk and to manage risk |
||||||||||||||||||
The module will cover:
- Information Security Fundamentals
-
Integrity, reliability, and availability
-
Authentication, identification, and authorisation
-
Access control
- Cryptography
-
Symmetric encryption
-
Asymmetric encryption
-
Digital signatures, certificates, and public key infrastructures (KPIs)
-
Security protocols
- Authentic and secure communication channels
-
Formal modelling of security protocols
-
Formal analysis of security protocols
- Privacy
-
Differential privacy
-
Privacy-preserving technologies
| Scheduled Learning & Teaching Activities | 33 | Guided Independent Study | 117 | Placement / Study Abroad |
|---|
|
Category |
Hours of study time |
Description |
|||||||||||||||||
|
Scheduled Learning & Teaching |
22 |
Lectures |
|||||||||||||||||
|
Scheduled Learning & Teaching |
11 |
Tutorials or Practical Work |
|||||||||||||||||
|
Guided Independent Study |
117 |
Background Reading and Self-Study |
|||||||||||||||||
|
Form of Assessment |
Size of the assessment e.g. duration/length |
ILOs assessed |
Feedback method |
||||||||||||||||
|
Tutorials and Practical Work |
11 hours |
All |
Oral |
||||||||||||||||
| Coursework | 30 | Written Exams | 70 | Practical Exams |
|---|
|
Form of Assessment
|
% of credit |
Size of the assessment e.g. duration/length |
ILOs assessed |
Feedback method |
|||||||||||||||
|
Written exam |
70 |
2 hours (Summer) |
all |
Oral on request |
|||||||||||||||
|
Coursework |
30 |
50 hours |
all |
Written |
|||||||||||||||
|
Original form of assessment |
Form of re-assessment |
ILOs re-assessed |
Time scale for re-assessment |
||||||||||||||||
|
All above |
Written exam (100%) |
all |
Ref/Def Examination Period |
||||||||||||||||
Students may be referred/deferred in the written exam, the coursework, or both, depending on their performance in the original assessment or the reasons for referral/deferral.
information that you are expected to consult. Further guidance will be provided by the Module Convener
https://vle.exeter.ac.uk/
Reading list for this module:
| Type | Author | Title | Edition | Publisher | Year | ISBN |
|---|---|---|---|---|---|---|
| Set | R.J. Anderson | Security Engineering: A Guide to Building Dependable Distributed Systems | 1st | John Wiley | 2001 | 0471389226 |
| Set | A.J.Menezes, S.A. Vanstone and P.C.V. Oorschot | Handbook of Applied Cryptography | 5th | CRC Press | 2001 | 0849385237 |
| Set | William Stallings, Lawrie Brown | Computer Security: Principles and Practice | 3rd | 2014 | ||
| Set | Huth, M and Ryan, M | Logic in Computer Science: Modelling and Reasoning about Systems | Cambridge University Press | 2004 | 052154310X | |
| Set | Schneier, Bruce | Applied Cryptography | 2nd | John Wiley & Sons | 1996 |
| CREDIT VALUE | 15 | ECTS VALUE | 7.5 |
|---|---|---|---|
| PRE-REQUISITE MODULES | None |
|---|---|
| CO-REQUISITE MODULES | None |
| NQF LEVEL (FHEQ) | 7 | AVAILABLE AS DISTANCE LEARNING | No |
|---|---|---|---|
| ORIGIN DATE | Wednesday 25th March 2020 | LAST REVISION DATE | Wednesday 25th March 2020 |
| KEY WORDS SEARCH | Cryptography, Privacy, Access Control, Cybersecurity, Information Security |
|---|
Please note that all modules are subject to change, please get in touch if you have any questions about this module.


