Skip to main content

Study information

Fundamentals of Security - 2020 entry

MODULE TITLEFundamentals of Security CREDIT VALUE15
MODULE CODEECMM462 MODULE CONVENER Diego Marmsoler (Coordinator)
DURATION: TERM 1 2 3
DURATION: WEEKS 11
Number of Students Taking Module (anticipated) 15
DESCRIPTION - summary of the module content

Our modern life depends on the security of computerised systems ranging from social aspects (e.g. phishing) to technical and mathematical aspects (e.g. access control, encryption). In this module, you will learn the fundamental concepts required for starting a career in various areas related to security (e.g. cyber security, data security, information security, computer security). You will learn core security concepts (e.g. authenticity, confidentiality, anonymity, privacy) and core technologies (e.g. encryption, authentication, authorisation). Moreover, you will learn the basic attacks on security systems and approaches for reasoning about the correctness of security techniques. 

 

Pre-requisites: none 

Co-requisites: none

 

AIMS - intentions of the module

The aim of this module to create awareness of the need for security and privacy in modern life, and to introduce the fundamental security and privacy mechanism used in modern computer systems. We will explore topics such as fundamentals of computer security, technology and principles of network security, cryptography, authentication and digital signatures, access control mechanisms, privacy, and anonymisation 

In more detail, the aims of the module are to give you an understanding of  

  • the different types of security threats and their effect on data privacy and business functions 
  • the fundamental principles of information security 
  • the fundamental principles of cryptography 
  • the fundamental principles of secure and privacy-aware data processing

 

INTENDED LEARNING OUTCOMES (ILOs) (see assessment section below for how ILOs will be assessed)

Module Specific Skills and Knowledge: 

1

Explain the fundamental information/cyber security concepts 

2

Select the appropriate security controls for a cyber system 

3

Select the appropriate privacy controls for a cyber system 

Discipline Specific Skills and Knowledge: 

3

Understand the role of cyber information security in online commercial, financial and other activities 

4

Understand the security and privacy guarantees and the limitations of modern security and privacy controls 

Personal and Key Transferable/ Employment Skills and Knowledge: 

5

Assessing and understanding the limitations of technology 

6

Understand risk and to manage risk 

 

SYLLABUS PLAN - summary of the structure and academic content of the module

The module will cover: 

  • Information Security Fundamentals 
  • Integrity, reliability, and availability 

  • Authentication, identification, and authorisation  

  • Access control 

  • Cryptography 
  • Symmetric encryption 

  • Asymmetric encryption 

  • Digital signatures, certificates, and public key infrastructures (KPIs) 

  • Security protocols 

  • Authentic and secure communication channels 
  • Formal modelling of security protocols 

  • Formal analysis of security protocols 

  • Privacy 
  • Differential privacy 

  • Privacy-preserving technologies

 

LEARNING AND TEACHING
LEARNING ACTIVITIES AND TEACHING METHODS (given in hours of study time)
Scheduled Learning & Teaching Activities 33 Guided Independent Study 117 Placement / Study Abroad
DETAILS OF LEARNING ACTIVITIES AND TEACHING METHODS

Category  

Hours of study time  

Description  

Scheduled Learning & Teaching 

22 

Lectures 

Scheduled Learning & Teaching 

11 

Tutorials or Practical Work 

Guided Independent Study 

117 

Background Reading and Self-Study 

 

ASSESSMENT
FORMATIVE ASSESSMENT - for feedback and development purposes; does not count towards module grade

Form of Assessment 

Size of the assessment e.g. duration/length 

ILOs assessed 

Feedback method 

Tutorials and Practical Work 

11 hours 

All 

Oral 

 

SUMMATIVE ASSESSMENT (% of credit)
Coursework 30 Written Exams 70 Practical Exams
DETAILS OF SUMMATIVE ASSESSMENT

Form of Assessment 

 

% of credit 

Size of the assessment e.g. duration/length 

ILOs assessed  

Feedback method 

Written exam 

70 

2 hours (Summer) 

all 

Oral on request 

Coursework 

30 

50 hours 

all 

Written 

 

DETAILS OF RE-ASSESSMENT (where required by referral or deferral)

Original form of assessment 

Form of re-assessment  

ILOs re-assessed 

Time scale for re-assessment 

All above 

Written exam (100%) 

all 

Ref/Def Examination Period 

 

RE-ASSESSMENT NOTES

Students may be referred/deferred in the written exam, the coursework, or both, depending on their performance in the original assessment or the reasons for referral/deferral.

 

RESOURCES
INDICATIVE LEARNING RESOURCES - The following list is offered as an indication of the type & level of
information that you are expected to consult. Further guidance will be provided by the Module Convener

https://vle.exeter.ac.uk/

Reading list for this module:

Type Author Title Edition Publisher Year ISBN
Set R.J. Anderson Security Engineering: A Guide to Building Dependable Distributed Systems 1st John Wiley 2001 0471389226
Set A.J.Menezes, S.A. Vanstone and P.C.V. Oorschot Handbook of Applied Cryptography 5th CRC Press 2001 0849385237
Set William Stallings, Lawrie Brown Computer Security: Principles and Practice 3rd 2014
Set Huth, M and Ryan, M Logic in Computer Science: Modelling and Reasoning about Systems Cambridge University Press 2004 052154310X
Set Schneier, Bruce Applied Cryptography 2nd John Wiley & Sons 1996
CREDIT VALUE 15 ECTS VALUE 7.5
PRE-REQUISITE MODULES None
CO-REQUISITE MODULES None
NQF LEVEL (FHEQ) 7 AVAILABLE AS DISTANCE LEARNING No
ORIGIN DATE Wednesday 25th March 2020 LAST REVISION DATE Wednesday 25th March 2020
KEY WORDS SEARCH Cryptography, Privacy, Access Control, Cybersecurity, Information Security

Please note that all modules are subject to change, please get in touch if you have any questions about this module.