Building Secure and Trustworthy Systems - 2020 entry
| MODULE TITLE | Building Secure and Trustworthy Systems | CREDIT VALUE | 15 |
|---|---|---|---|
| MODULE CODE | ECMM463 | MODULE CONVENER | Prof Achim D. Brucker (Coordinator) |
| DURATION: TERM | 1 | 2 | 3 |
|---|---|---|---|
| DURATION: WEEKS | 11 |
| Number of Students Taking Module (anticipated) | 15 |
|---|
Building secure and trustworthy systems, I.e. systems that are hard to attack and protect the privacy of their users, are very hard to build. In this module, you will learn the foundations of building secure (software) systems ‘right from the beginning’. You will learn how to assess the threats of a system that need to be mitigated while building it, the risk assessment of vulnerabilities, as well as various approaches (e.g. defensive programming) and techniques for building secure systems. The module focuses on defensive security techniques that might be used by “blue teams.”
Pre-requisites: none
Co-requisites: ECM4xxx-a (Fundamentals of Security)
This module aims to give you a broad understanding of techniques for assessing the risks a modern IT system is exposed. Driven by these risks, we will discuss several defensive security techniques for building security and trustworthy (software) systems.
In more detail, the aims of the module are to enable you to
- assess the security of software architectures
- understand the principles of secure software architectures
- understand software vulnerabilities, their causes, and impact
- to develop secure software using defensive programming techniques
- understand the principles of security testing and verification techniques
|
Module Specific Skills and Knowledge: |
|||||||||||||||||||
|
1 |
Develop secure and trustworthy systems |
||||||||||||||||||
|
2 |
Select the appropriate security controls for a given system |
||||||||||||||||||
|
Discipline Specific Skills and Knowledge: |
|||||||||||||||||||
|
3 |
Understand the importance of building systems that are “secure by design” |
||||||||||||||||||
|
4 |
Understand the concept of defensive security |
||||||||||||||||||
|
Personal and Key Transferable/ Employment Skills and Knowledge: |
|||||||||||||||||||
|
5 |
Being able to balance potentially contradicting goals such as security and costs |
||||||||||||||||||
|
6 |
Assess and manage the (security) risk of a specific system |
||||||||||||||||||
The module will cover:
- Security Development Life Cycle (SDLC)
- Threat modelling
- Software vulnerabilities
- Defensive programming
- Security testing and verification
| Scheduled Learning & Teaching Activities | 33 | Guided Independent Study | 117 | Placement / Study Abroad |
|---|
|
Category |
Hours of study time |
Description |
|||||||||||||||||
|
Scheduled Learning & Teaching |
22 |
Lectures |
|||||||||||||||||
|
Scheduled Learning & Teaching |
11 |
Tutorials or Practical Work |
|||||||||||||||||
|
Guided Independent Study |
117 |
Background Reading and Self-Study |
|||||||||||||||||
|
Form of Assessment |
Size of the assessment e.g. duration/length |
ILOs assessed |
Feedback method |
||||||||||||||||
|
Tutorials and Practical Work |
11 hours |
All |
Oral |
||||||||||||||||
| Coursework | 30 | Written Exams | 70 | Practical Exams |
|---|
|
Form of Assessment
|
% of credit |
Size of the assessment e.g. duration/length |
ILOs assessed |
Feedback method |
|||||||||||||||
|
Written exam |
70 |
2 hours (Summer) |
all |
Oral on request |
|||||||||||||||
|
Coursework |
30 |
50 hours |
all |
Written |
|||||||||||||||
|
Original form of assessment |
Form of re-assessment |
ILOs re-assessed |
Time scale for re-assessment |
||||||||||||||||
|
All above |
Written exam (100%) |
all |
Ref/Def Examination Period |
||||||||||||||||
information that you are expected to consult. Further guidance will be provided by the Module Convener
https://vle.exeter.ac.uk/
Reading list for this module:
| Type | Author | Title | Edition | Publisher | Year | ISBN |
|---|---|---|---|---|---|---|
| Set | R.J. Anderson | Security Engineering: A Guide to Building Dependable Distributed Systems | 1st | John Wiley | 2001 | 0471389226 |
| Set | M. Howard, D. LeBlanc and J. Viega | 24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them | 1st | McGraw Hill | 2010 | |
| Set | B. Chess and J. West | Secure Programming with Static Analysis | 1st | Addison Wesley | 2007 | |
| Set | Felderer M, et al | Security Testing: A Survey, Advances in Computers | 101 | Advances in Computers | 2016 | |
| Set | Shostack, Adam | Threat Modelling: Designing for Security | 1st | Wiley | 2014 | |
| Set | Othmane et al | Empirical Research for Software Security: Foundations and Experience | CRC Press | 2017 |
| CREDIT VALUE | 15 | ECTS VALUE | 7.5 |
|---|---|---|---|
| PRE-REQUISITE MODULES | None |
|---|---|
| CO-REQUISITE MODULES | None |
| NQF LEVEL (FHEQ) | 7 | AVAILABLE AS DISTANCE LEARNING | No |
|---|---|---|---|
| ORIGIN DATE | Wednesday 25th March 2020 | LAST REVISION DATE | Friday 24th July 2020 |
| KEY WORDS SEARCH | Software security, Threat modelling, Security by design, SDLC, Defensive security |
|---|
Please note that all modules are subject to change, please get in touch if you have any questions about this module.


