Module Descriptor Co1562 Computer Systems & Security
Module Descriptor Co1562 Computer Systems & Security
MODULE AIMS
Gradually, we are becoming more and more dependent on computing systems in our daily lives. The
services provided by these systems, such as online shopping, social networking, mobile banking and
so forth represent the backbone of modern communities. Smart cities, Internet of Things (IoT), smart
vehicles, and smart grids are a few examples of emerging technologies that will shape the future for
coming generations.
Users anticipate these systems to operate exactly as expected and for their services to be secure
and available whenever required. Systems damage or data loss through accident or malicious
attacks can have serious implications including financial losses and even loss of lives.
In such a complicated eco-system, achieving computer systems security and services availability is
no longer the responsibility of computer security specialists. In fact, it is a challenge that spans
across all disciplines in computing. For instance, software engineers, game developers and
information systems engineers ought to implement secure software systems to ensure their reliability
and robustness against attacks such as game cheating and SQL injection. Moreover, network
engineers must consider security measures when building a network to defend and mitigate against
various attacks such as Denial of Service (DoS) and malware. Finally, forensics investigators should
be aware of the current security measures/attacks to investigate the situation and assess the data
breach.
Top level view of computer functions and interconnection including computer components (e.g.
CPUs,
users.
A subset of the following topics will be considered, depending on topical issues: Linux OR Windows
Security, Database Security, Web Security, Mobile Phone Security, Social Network Security and
Privacy issues and Wireless Network Security.
A subset of the following topics will be considered, depending on topical issues: Smart City security
(e.g., recent hacks against smart vehicles), IoT Security, Smart Grids Security, and more as new
emerging technologies come under attacks every day.
ASSESSMENT METHODS
The method of assessment for this module has been designed to test all the learning outcomes.
Students must demonstrate successful achievement of these learning outcomes to pass the module.
Number of Form of % Size of Category of Learning
Assessments Assessment weighting Assessment/Duration/ assessment Outcomes being
Wordcount (indicative assessed
only)
1 Summary of 50% Approximately 10 Coursework 1, 2, 3
investigation hours preparation
time presented
through a summary
(e.g. Poster) (2000
words equivalent)
1 Report 50% 1200-2000 words Coursework 2, 3, 4
The module examines a useful range of the fundamental aspects of computer systems and security.
Lectures will be delivered on campus to provide the formal taught content including concepts,
techniques and information without digging into the mathematical details of some tools (e.g.,
cryptography).
The practical/tutorial sessions supplement and support the lectures allowing a discovery approach to
learning. Students are expected to engage in research activities for case studies and latest news of
security breaches and hacks. URLs that contain relevant research material will be provided to the
students in support of the syllabus. Students will prepare and share summaries of technologies and
system components.
Students will discuss case studies and explore implications: e.g. considering commercial issues (e.g.
“How much security is enough?”), ethical issues (e.g. “Is it ethical to crack protection on a mobile
phone?”), legal issues (e.g. “Can I connect to my neighbour’s WiFi?”), and social issues (e.g. “Am I at
fault if I don’t protect my device and it is taken over and used maliciously?”)
The assessment is designed to evenly assess the students’ comprehension of theoretical topics
relevant to computer systems and security and of practical elements including tools and methods
needed to achieve computing systems security. This also includes evaluation/assessment of recent
security/data breaches and how to deal with them.
Directed reading 40
Preparation for class 24
Preparation for assessment 24
Researching and developing coursework 40
128
TOTAL GUIDED INDEPENDENT STUDY HOURS
200
TOTAL STUDENT LEARNING HOURS
Kim, D. and Solomon, M. (2012) Fundamentals of information systems security, Jones & Bartlett.
Pfleeger C.P., Pfleeger S.L. and Margulies J. (2015) Security in Computing, fifth edition, Prentice
Hall / Pearson Education Inc.
Electronic books and journals available online via UCLan’s Discovery search service.