Cyber security has always been an important aspect of computing systems but its importance has increased greatly in recent years. The curriculum covers areas where cyber security is of major importance, but have different security requirements and may be exposed to different threats and attacks. It also covers techniques and mechanisms used to secure computer systems and data to meet those requirements and protect them. The areas looked at include computer operating systems (and increasingly, distributed operating systems), distributed applications (such as electronic commerce over the Internet), embedded systems (ranging from smart cards to large industrial plant and telecommunications systems), and users. The techniques and mechanisms looked at include cryptography, authentication & authorisation, and access control. Furthermore, the curriculum integrates the legal, ethical, and professional perspectives, for instance, to address concerns about data security, privacy, and societal impact of computing systems.
Total contact hours: 30
Private study hours: 120
Total study hours: 150
Main assessment methods
2 hour written exam - 50%
Coursework - 50%
13.2 Reassessment methods
Like for like.
Anderson, R., "Security Engineering: A Guide to Building Dependable Distributed Systems" 2nd ed., 2008, Wiley.
BCS Code of Conduct, https://www.bcs.org.uk/
Pfleeger, C.P., Pfleeger, S.L., and Marulies, J., "Security in Computing", 5th ed., 2015, Prentice Hall.
Cranor, L.F. & Garfinkel, S., "Security and Usability: Designing Secure Systems that
People Can Use" 2005, O'Reilly Media.
Stallings, W., "Cryptography and Network Security: Principles and Practice" 7th ed., 2017, Pearson.
Ferguson, N., Kohno, T., and Schneier, B. "Cryptography Engineering: Design Principles and Practical Applications", 1st ed., 2010, John Wiley & Sons.
Garfinkel, S. and Lipford, H.R., "Usable Security: History, Themes, and Challenges", 2014, Morgan & Claypool Publishers.
On successfully completing the module students will be able to:
1. Understand foundational security principles and core technology to enforce and maintain security of data and computer systems;
2. Make informed choices of the appropriate security measures to put into place for a given network and/or operating system;
3. Understand the importance of putting security into the context of a larger system including hardware, software, and human users;
4. Understand how cryptography can be used for providing security within applications;
5. Understand and implement selected fundamental algorithms used in cryptography.
University of Kent makes every effort to ensure that module information is accurate for the relevant academic session and to provide educational services as described. However, courses, services and other matters may be subject to change. Please read our full disclaimer.