Module and Programme Catalogue

Search site

Find information on

2016/17 Undergraduate Module Catalogue

COMP3911 Secure Computing

10 creditsClass Size: 80

Module manager: Dr Nick Efford
Email: n.d.efford@leeds.ac.uk

Taught: Semester 1 (Sep to Jan) View Timetable

Year running 2016/17

Pre-requisites

COMP2931Software Engineering

This module is not approved as a discovery module

Module summary

Security is an increasing problem for all computer systems. Users, administrators and developers all need to be aware of risks and the need to develop systems that are resistant to known attacks. In this module you will learn about threats to the security of a software system, design and implement software that is resistant to well-known attacks and learn how security incidents can be detected and analysed.

Objectives

On completion of this module, students should be able to:

- Understand and model threats to the security of a software system
- Design and implement software that is resistent to well-known attacks
- Test and report on the security of an existing system in a responsible
and ethical fashion
- Understand how security incidents can be detected and analysed

Learning outcomes
On completion of the year/programme students should have provided evidence of being able to:
-understand and demonstrate coherent and detailed subject knowledge and professional competencies some of which will be informed by recent research/scholarship in the discipline;
-deploy accurately standard techniques of analysis and enquiry within the discipline;
-demonstrate a conceptual understanding which enables the development and sustaining of an argument;
-describe and comment on particular aspects of recent research and/or scholarship;
-appreciate the uncertainty, ambiguity and limitations of knowledge in the discipline;
-make appropriate use of scholarly reviews and primary sources;


Syllabus

- Security risks associated with network protocols
- Malicious software: types, modes of attack, case studies, countermeasures
- Vulnerabilities in low- and high-level languages
- Database and web application vulnerabilities
- Ethics of security research and vulnerability disclosure
- Source code auditing and analysis
- Penetration testing tools and techniques
- Approaches to threat modelling and risk assessment
- Secure system design principles
- Role of cryptography in securing software systems
- Use of cryptographic algorithms in modern software development platforms
- Encryption in networks: SSL, SSH, tunnelling, VPNs
- Authentication techniques: passwords, biometrics, two-factor authentication
- Intrusion detection and incident response
- Principles of computer forensics

Teaching methods

Delivery typeNumberLength hoursStudent hours
Laboratory52.0010.00
Lecture201.0020.00
Private study hours70.00
Total Contact hours30.00
Total hours (100hr per 10 credits)100.00

Opportunities for Formative Feedback

Coursework and labs.

Methods of assessment


Coursework
Assessment typeNotes% of formal assessment
AssignmentCoursework15.00
AssignmentCoursework15.00
Total percentage (Assessment Coursework)30.00

Normally resits will be assessed by the same methodology as the first attempt, unless otherwise stated


Exams
Exam typeExam duration% of formal assessment
Open Book exam2 hr 00 mins70.00
Total percentage (Assessment Exams)70.00

Normally resits will be assessed by the same methodology as the first attempt, unless otherwise stated

Reading list

There is no reading list for this module

Last updated: 07/03/2017

Disclaimer

Browse Other Catalogues

Errors, omissions, failed links etc should be notified to the Catalogue Team.PROD

© Copyright Leeds 2019