Fundamentals of Security and Project - 2025 entry
| MODULE TITLE | Fundamentals of Security and Project | CREDIT VALUE | 30 |
|---|---|---|---|
| MODULE CODE | COMM462Z | MODULE CONVENER | Dr Saif Alzubi (Coordinator) |
| DURATION: TERM | 1 | 2 | 3 |
|---|---|---|---|
| DURATION: WEEKS | 11 |
| Number of Students Taking Module (anticipated) |
|---|
Our modern life depends on the security of computerised systems ranging from social aspects (e.g. phishing) to technical and mathematical aspects (e.g. access control, encryption). In this module, you will learn the fundamental concepts required for starting a career in various areas related to security (e.g. cyber security, data security, information security, computer security). You will learn core security concepts (e.g. authenticity, confidentiality, anonymity, privacy) and core technologies (e.g. encryption, authentication, authorisation). Moreover, you will learn the basic attacks on security systems and approaches for reasoning about the correctness of security techniques. Research Project: In this module, you will work on a research problem in an area relating to your programme of study, applying the tools and techniques that you have learned throughout the modules of the programme. This is an independent project, supervised by an expert from the relevant area, and culminates in writing a dissertation in the form of a research paper, describing your research and its results.
The aim of this module to create awareness of the need for security and privacy in modern life, and to introduce the fundamental security and privacy mechanism used in modern computer systems. We will explore topics such as fundamentals of computer security, technology and principles of network security, cryptography, authentication and digital signatures, access control mechanisms, privacy, and anonymisation.
In more detail, the aims of the module are to give you an understanding of:
- The different types of security threats and their effect on data privacy and business functions the fundamental principles of information security
- The fundamental principles of cryptography
- The fundamental principles of secure and privacy-aware data processing
On successful completion of this module you should be able to:
Module Specific Skills and Knowledge
2. Select the appropriate security & privacy controls for a cyber system
Discipline Specific Skills and Knowledge
4. Understand the security and privacy guarantees and the limitations of modern security and privacy controls
Personal and Key Transferable / Employment Skills and Knowledge
6. Understand risk and to manage risk
The module will cover:
Information Security Fundamentals
- Integrity, reliability, and availability
- Authentication, identification, and authorisation
- Access control
Cryptography
- Symmetric encryption Asymmetric encryption
- Digital signatures, certificates, and public key infrastructures (KPIs)
- Security protocols
Authentic and secure communication channels
- Formal modelling of security protocols
- Formal analysis of security protocols
Privacy
- Differential privacy
- Privacy-preserving technologies
| Scheduled Learning & Teaching Activities | 66 | Guided Independent Study | 234 | Placement / Study Abroad | 0 |
|---|
| Category | Hours of study time | Description |
| Scheduled Learning & Teaching activities | 66 | Asynchronous online learning activities, skill-based exercises and practical work |
| Guided independent study | 200 | Project work |
| Guided independent study | 34 | Background reading and self-study Including preparation for online content, reflection on taught material, wider reading and completion of assessments |
| Form of Assessment | Size of Assessment (e.g. duration/length) | ILOs Assessed | Feedback Method |
|---|---|---|---|
| Weekly assigned work/exercises/quizzes/ forum discussion at the end of each sub-session and the end of week activities | 1 hour per week | All | Written feedback provided summarising performance and key areas for improvement |
| Coursework | 100 | Written Exams | 0 | Practical Exams | 0 |
|---|
| Form of Assessment | % of Credit | Size of Assessment (e.g. duration/length) | ILOs Assessed | Feedback Method |
|---|---|---|---|---|
| Project task (practical work and report) | 70 | Code notebook and 4 pages-word report | All | Written |
| Pitch Deck Project Presentation | 30 | 90 hours | All | Written |
| Original Form of Assessment | Form of Re-assessment | ILOs Re-assessed | Time Scale for Re-assessment |
|---|---|---|---|
| Project task (practical work and report) | Code notebook and written report (70%) | All | Referral/deferral period |
| Pitch Deck Project Presentation | Pitch Deck Project Presentation (30%) | All | Referral/deferral period |
Reassessment will be by coursework in the failed or deferred element only. For referred candidates, the module mark will be capped at 50%. For deferred candidates, the module mark will be uncapped.
information that you are expected to consult. Further guidance will be provided by the Module Convener
Basic reading:
- Computer Security: Art and Science Book by Matt Bishop 2019, Second edition
- Applied Cryptography, second edition: protocols, algorithms, and source code in C Book by Bruce Schneier 2017
- Mathematical Logic for Computer Science Book by M. Ben-Ari 2012 Third edition
- Differential privacy: A survey of results
- Cryptography and Network Security: Principles and Practice Book by William Stallings 2023, Eighth edition
Web based and Electronic Resources:
- ELE
Other Resources:
Reading list for this module:
| CREDIT VALUE | 30 | ECTS VALUE | 30 |
|---|---|---|---|
| PRE-REQUISITE MODULES | None |
|---|---|
| CO-REQUISITE MODULES | None |
| NQF LEVEL (FHEQ) | 7 | AVAILABLE AS DISTANCE LEARNING | Yes |
|---|---|---|---|
| ORIGIN DATE | Tuesday 30th September 2025 | LAST REVISION DATE | Wednesday 1st October 2025 |
| KEY WORDS SEARCH | Cryptography, Privacy, Access Control, Cybersecurity, Information Security |
|---|
Please note that all modules are subject to change, please get in touch if you have any questions about this module.


