Please note
This document only provides information for the academic year selected and does not form part of the student contract
School:
School of Computing and Engineering
Credit Rating:
15
Level (including FHEQ):
M (FHEQ Level 7)
Graded or Non Graded:
Graded
Version Valid From:
2023-09-01
Module Leader:
Rupak Kharel
Version Number
2023.04
Learning Methods
Guided Independent Study
Synopsis
Upon completion of this module, you will acquire a thorough understanding of the security attacks that may threaten wired and wireless networked systems and how these attacks are possible, usually by exploiting vulnerabilities in the design, implementation, or operation of network protocols. You will explore several key network security techniques,… For more content click the Read More button below.
Learning Strategy
The University’s Virtual Learning Environment will be used to support distance learners throughout their learning experience, providing key ideas and themes through lecture content, and a variety of asynchronous activities. Substantive issues will be presented through case studies and research papers. Wherever possible, issues will be related to the students’… For more content click the Read More button below.
Outline Syllabus
Introduction to network security: security services and network protocols vulnerabilities Authentication: basic and network authentication protocols, Needham–Schroeder, Kerberos, Secure Shell (SSH) Access Control: network access control mechanisms, access control lists. Transport layer security (TLS, aka SSL): SSL record protocol, SSL handshake IPsec and virtual private network (VPN): transport and tunnel… For more content click the Read More button below.
Learning Outcomes
On successful completion of this module students will
1.
Formulate a systematic understanding of knowledge, and critical awareness of current network security challenges and how they are mitigated by security protocols.
2.
Demonstrate originality in the application of practical knowledge and critical evaluation of a given scenario.
3.
Explain and critically analyse a variety of security attacks and propose appropriate security mechanisms to detect and prevent such attacks.
4.
Satisfactorily resolve complex issues and make sound judgment such as assessing vulnerable enterprise network to determine security implications, including mitigation actions.
5.
Communicate conclusions and work to specialist and non-specialist audiences.
6.
Demonstrate self-direction and originality in tackling and solving problems, including autonomously planning and implementing tasks at a professional level.
Formative Assessment
Assessment 1: Focused classwork observations
Summative Assessment
Assessment 1: Written Assignment
Assessment Criteria
Clearly explain and justify the identified security vulnerabilities.Correctly map each identified vulnerability to a distinct security attack that may exploit it, and accurately describe the attack.Demonstrate and critically justify the selection of appropriate security countermeasures to mitigate the above attacks.