Please note

This document only provides information for the academic year selected and does not form part of the student contract

School:

School of Computing and Engineering

Credit Rating:

15

Level (including FHEQ):

M (FHEQ Level 7)

Graded or Non Graded:

Graded

Version Valid From:

2023-09-01

Module Leader:

Rupak Kharel

Version Number

2023.04

Learning Methods

Guided Independent Study

Synopsis

Upon completion of this module, you will acquire a thorough understanding of the security attacks that may threaten wired and wireless networked systems and how these attacks are possible, usually by exploiting vulnerabilities in the design, implementation, or operation of network protocols. You will explore several key network security techniques,… For more content click the Read More button below.

Learning Strategy

The University’s Virtual Learning Environment will be used to support distance learners throughout their learning experience, providing key ideas and themes through lecture content, and a variety of asynchronous activities. Substantive issues will be presented through case studies and research papers. Wherever possible, issues will be related to the students’… For more content click the Read More button below.

Outline Syllabus

Introduction to network security: security services and network protocols vulnerabilities Authentication: basic and network authentication protocols, Needham–Schroeder, Kerberos, Secure Shell (SSH) Access Control: network access control mechanisms, access control lists. Transport layer security (TLS, aka SSL): SSL record protocol, SSL handshake IPsec and virtual private network (VPN): transport and tunnel… For more content click the Read More button below.

Learning Outcomes

On successful completion of this module students will
1.
Formulate a systematic understanding of knowledge, and critical awareness of current network security challenges and how they are mitigated by security protocols.
2.
Demonstrate originality in the application of practical knowledge and critical evaluation of a given scenario.
3.
Explain and critically analyse a variety of security attacks and propose appropriate security mechanisms to detect and prevent such attacks.
4.
Satisfactorily resolve complex issues and make sound judgment such as assessing vulnerable enterprise network to determine security implications, including mitigation actions.
5.
Communicate conclusions and work to specialist and non-specialist audiences.
6.
Demonstrate self-direction and originality in tackling and solving problems, including autonomously planning and implementing tasks at a professional level.

Formative Assessment

Assessment 1: Focused classwork observations

Summative Assessment

Assessment 1: Written Assignment

Assessment Criteria

Clearly explain and justify the identified security vulnerabilities.Correctly map each identified vulnerability to a distinct security attack that may exploit it, and accurately describe the attack.Demonstrate and critically justify the selection of appropriate security countermeasures to mitigate the above attacks.