2022/23 Undergraduate Module Catalogue
XJCO3911 Secure Computing
10 creditsClass Size: 100
Module manager: Dr Nick Efford
Email: n.d.efford@leeds.ac.uk
Taught: Semester 1 (Sep to Jan) View Timetable
Year running 2022/23
Pre-requisites
XJCO2221 | Networks |
XJCO2912 | Software Engineering Principles |
This module is not approved as a discovery module
Module summary
Security is an increasing problem for all computer systems. Users, administrators and developers all need to be aware of the risks and the need to develop systems that are resistant to attacks. It is the responsibility of a professional Computer Science practitioner to be aware of tools and techniques that can be used to mitigate the threats to systems security. This module focuses on these threats and how they can be mitigated by good design, implementation and testing of computer systems. In addition, the module will also cover intrusion detection and analysis. This module considers case studies from industrial security breaches and contributes to commercial awareness.Objectives
This module will provide the fundamental skills and knowledge required to develop secure software. This modules contributes to developing responsible and commercially aware Computer Science practitioners.Learning outcomes
On completion of the year/programme students should have provided evidence of being able to:
-understand and demonstrate coherent and detailed subject knowledge and professional competencies some of which will be informed by
recent research/scholarship in the discipline;
-deploy accurately standard techniques of analysis and enquiry within the discipline;
-demonstrate a conceptual understanding which enables the development and sustaining of an argument;
-describe and comment on particular aspects of recent research and/or scholarship;
-appreciate the uncertainty, ambiguity and limitations of knowledge in the discipline;
-make appropriate use of scholarly reviews and primary sources;
Syllabus
This module covers the following 5 topic areas:
- Cryptography: the role of cryptography in security, modern cryptographic algorithms and their use in software development and encryption in computer networks.
- Risk management: threat modelling and risk assessment.
- Modes of attack: network protocols, malware and software vulnerabilities.
- Mitigation techniques: counter measures, authentication techniques (biometrics and two-factor authentication), penetration testing, secure systems design and intrusion detection.
- Ethical issues: ethics of security research, responsible disclosure and privacy.
Teaching methods
Delivery type | Number | Length hours | Student hours |
Laboratory | 10 | 2.00 | 20.00 |
Lecture | 20 | 1.00 | 20.00 |
Private study hours | 60.00 | ||
Total Contact hours | 40.00 | ||
Total hours (100hr per 10 credits) | 100.00 |
Opportunities for Formative Feedback
Coursework and labs.Methods of assessment
Coursework
Assessment type | Notes | % of formal assessment |
In-course Assessment | Coursework | 15.00 |
In-course Assessment | Coursework | 15.00 |
Total percentage (Assessment Coursework) | 30.00 |
Normally resits will be assessed by the same methodology as the first attempt, unless otherwise stated
Exams
Exam type | Exam duration | % of formal assessment |
Online Time-Limited assessment | 2 hr | 70.00 |
Total percentage (Assessment Exams) | 70.00 |
Resits will be assessed by online time-limited assessment only.
Reading list
The reading list is available from the Library websiteLast updated: 01/06/2022 16:59:02
Browse Other Catalogues
- Undergraduate module catalogue
- Taught Postgraduate module catalogue
- Undergraduate programme catalogue
- Taught Postgraduate programme catalogue
Errors, omissions, failed links etc should be notified to the Catalogue Team.PROD