Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
16 views

Module Descriptor Co1562 Computer Systems & Security

This document describes a module on computer systems and security. The module aims to explore computer architecture, operating systems, security threats, and emerging security issues. Students will examine security threats and data breaches, and propose countermeasures. Assessment includes a summary and report evaluating security topics.

Uploaded by

Edward Lee
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views

Module Descriptor Co1562 Computer Systems & Security

This document describes a module on computer systems and security. The module aims to explore computer architecture, operating systems, security threats, and emerging security issues. Students will examine security threats and data breaches, and propose countermeasures. Assessment includes a summary and report evaluating security topics.

Uploaded by

Edward Lee
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

MODULE DESCRIPTOR

MODULE Computer Systems and Security


TITLE
MODULE CO1562 (L4) JACS I100 CREDIT 20 credits / 10 ECTS
CODE CODE VALUE

DATE OF April 2017 VERSION 1


APPROVAL NUMBER
SCHOOL Physical Sciences and PARTNER Burnley, Carlisle, Runshaw,
Computing INSTITUTION Hugh Baird Colleges

RELATIONSHIP WITH OTHER MODULES


Co-requisites NONE Prerequisites NONE Excluded NONE
Combinations

MODULE AIMS
Gradually, we are becoming more and more dependent on computing systems in our daily lives. The
services provided by these systems, such as online shopping, social networking, mobile banking and
so forth represent the backbone of modern communities. Smart cities, Internet of Things (IoT), smart
vehicles, and smart grids are a few examples of emerging technologies that will shape the future for
coming generations.

Users anticipate these systems to operate exactly as expected and for their services to be secure
and available whenever required. Systems damage or data loss through accident or malicious
attacks can have serious implications including financial losses and even loss of lives.

In such a complicated eco-system, achieving computer systems security and services availability is
no longer the responsibility of computer security specialists. In fact, it is a challenge that spans
across all disciplines in computing. For instance, software engineers, game developers and
information systems engineers ought to implement secure software systems to ensure their reliability
and robustness against attacks such as game cheating and SQL injection. Moreover, network
engineers must consider security measures when building a network to defend and mitigate against
various attacks such as Denial of Service (DoS) and malware. Finally, forensics investigators should
be aware of the current security measures/attacks to investigate the situation and assess the data
breach.

To tackle this multidisciplinary challenge, it is of great importance to develop an understanding of the


different parts of computer systems, their functions, how they are integrated and their vulnerabilities:
this includes computer system architecture, operating systems, computer networks, human element
in those systems, possible threats, and systems security.

This module aims to:

1. Explore the fundamentals of computer architecture and operating systems.


2. Examine a range of recent security threats and data breaches, their consequences on
businesses and potential countermeasures.
3. Create awareness of the importance of complying with law, ethical and privacy issues regarding
any collected data.
4. Discuss recent technologies and their emerging security problems.
5. Make students mindful of their computer security behaviour.
MODULE CONTENT
Computer System Components/Architecture

Top level view of computer functions and interconnection including computer components (e.g.
CPUs,

Primary/Secondary/Cache Memory, I/O devices),

application programs and

users.

Operating Systems Concepts

What Operating Systems (OSs) do? Process/Memory/Storage Management, Process


Synchronisation, Concurrency, Transactions Management, Deadlocks, File Systems and Hardware
Virtualisation.

Key Concepts of Protection and Security

Foundations of Computer Security (Confidentiality, Integrity, Availability, Accountability,


Nonrepudiation, Reliability), Computer Security Objectives, Security Management (Policies,
Measures etc.), Risk & Threat Analysis (Assets, Threats, Vulnerabilities, Attacks). Security Tools

Identification and Authentication, Access Control (User-Centred Security Approach), Cryptography


as a tool (Symmetric/Asymmetric Encryption, Digital Signatures, Secure Hashing), Firewalls,
Detection, Prevention and Recovery Mechanisms, Aftermath (Digital Forensics for investigating,
monitoring and preventing)

Introduction to Computing Systems Security

A subset of the following topics will be considered, depending on topical issues: Linux OR Windows
Security, Database Security, Web Security, Mobile Phone Security, Social Network Security and
Privacy issues and Wireless Network Security.

Emerging Technologies Security, Privacy and Ethical issues

A subset of the following topics will be considered, depending on topical issues: Smart City security
(e.g., recent hacks against smart vehicles), IoT Security, Smart Grids Security, and more as new
emerging technologies come under attacks every day.

INTENDED LEARNING OUTCOMES

On successful completion of this module a student will be able to:


1. Explain the various components of operating systems and their roles.
2. Compare different security threats affecting different computing systems and propose suitable
countermeasures.
3. Describe different tools and techniques to secure a computing system against specific
threats.
4. Identify potential implications of technical decisions

ASSESSMENT METHODS
The method of assessment for this module has been designed to test all the learning outcomes.
Students must demonstrate successful achievement of these learning outcomes to pass the module.
Number of Form of % Size of Category of Learning
Assessments Assessment weighting Assessment/Duration/ assessment Outcomes being
Wordcount (indicative assessed
only)
1 Summary of 50% Approximately 10 Coursework 1, 2, 3
investigation hours preparation
time presented
through a summary
(e.g. Poster) (2000
words equivalent)
1 Report 50% 1200-2000 words Coursework 2, 3, 4

MODULE PASS REQUIREMENTS


To pass this module you must achieve a mark of 40% or above, aggregated across all the
assessments.
APPENDIX

MODULE CODE: CO1562


MODULE TITLE: Computer Systems and Security

LOCATION OF STUDY: Burnley, Carlisle, Runshaw, Hugh Baird Colleges

MODULE M Hashem Eiza


TUTOR(S)

MODULE Semester 1 Semester 2 Semester 3


DELIVERY Year long Semester 1 & 2  Semester 2 & 3

MODULE LEARNING PLAN

LEARNING, TEACHING AND ASSESSMENT STRATEGY

The module examines a useful range of the fundamental aspects of computer systems and security.
Lectures will be delivered on campus to provide the formal taught content including concepts,
techniques and information without digging into the mathematical details of some tools (e.g.,
cryptography).

The practical/tutorial sessions supplement and support the lectures allowing a discovery approach to
learning. Students are expected to engage in research activities for case studies and latest news of
security breaches and hacks. URLs that contain relevant research material will be provided to the
students in support of the syllabus. Students will prepare and share summaries of technologies and
system components.

Students will discuss case studies and explore implications: e.g. considering commercial issues (e.g.
“How much security is enough?”), ethical issues (e.g. “Is it ethical to crack protection on a mobile
phone?”), legal issues (e.g. “Can I connect to my neighbour’s WiFi?”), and social issues (e.g. “Am I at
fault if I don’t protect my device and it is taken over and used maliciously?”)

The assessment is designed to evenly assess the students’ comprehension of theoretical topics
relevant to computer systems and security and of practical elements including tools and methods
needed to achieve computing systems security. This also includes evaluation/assessment of recent
security/data breaches and how to deal with them.

SCHEDULED LEARNING AND TEACHING ACTIVITY No of


hours
Lecture – 1 hour weekly 24
Practical / tutorial – 2 hours weekly 48

TOTAL SCHEDULED LEARNING HOURS 72

GUIDED INDEPENDENT STUDY

Directed reading 40
Preparation for class 24
Preparation for assessment 24
Researching and developing coursework 40
128
TOTAL GUIDED INDEPENDENT STUDY HOURS
200
TOTAL STUDENT LEARNING HOURS

BIBLIOGRAPHY AND LEARNING SUPPORT MATERIAL


The most up to date bibliography for this module is available via the on-line reading list – click on
the link below: http://readinglists.central-lancashire.ac.uk/index

Recommended Books, Journals and Web Sites

Goodrich M. and Tamassia, R. (2011) Introduction to Computer Security, Publisher:


AddisonWesley.

Kim, D. and Solomon, M. (2012) Fundamentals of information systems security, Jones & Bartlett.

Pfleeger C.P., Pfleeger S.L. and Margulies J. (2015) Security in Computing, fifth edition, Prentice
Hall / Pearson Education Inc.

Computers & Security Journal [URL:http://www.sciencedirect.com/science/journal/01674048]


(Accessed December 2016)

INFOSYSSEC Website [URL:http://www.infosyssec.com/infosyssec/index.shtml] (Accessed


December 2016)

Electronic resources available online via Blackboard to support student learning.

Electronic books and journals available online via UCLan’s Discovery search service.

You might also like