¹û¶³Ó°Ôº

XClose

¹û¶³Ó°Ôº Module Catalogue

Home
Menu

Computer Security I (COMP0054)

Key information

Faculty
Faculty of Engineering Sciences
Teaching department
Computer Science
Credit value
15
Restrictions
Module delivery for UG Masters (FHEQ Level 7) available on MEng Computer Science; MEng Mathematical Computation. Module delivery for PGT (FHEQ Level 7) available on MSc Emerging Digital Technologies; MSc Information Security; MSc Software System Engineering.
Timetable

Alternative credit options

There are no alternative credit options available for this module.

Description

Aims:
This module aims to introduce computer security concepts and techniques. It covers core security principles to engineer systems that provide properties like confidentiality, integrity, or availability, despite the efforts of malicious entities to subvert them.

Intended learning outcomes:

On successful completion of the module, a student will be able to:

  1. Recognise security properties of systems, as well as formulate security policies, and model the threats they may face.
  2. Select appropriate controls to guarantee that the security policies are implemented robustly and may resist efforts to subvert them, through exposure to a number of established industry and government security mechanisms and design patterns.
  3. AnalyseÌýcomputer systemsÌýand developÌýstrategies to bypass security controls.

Indicative content:

The following are indicative of the topics the module will typically cover:

The module provides strong foundations in security engineering and enables students to more easily follow other modules in Information Security and in Applied Cryptography.

The first half of the module covers topics which underpin security of systems:

  • Basic principles.
  • Security policies.
  • Access control (theory and practice).
  • Hardware,
  • OS security fundamentals.

We will then dive into the details of various technical protection mechanisms and computer attacks including hardware, operating system, and side channel attacks. We will also learn about defensive technology in high-integrity systems both from a theoretical and a practical level. We will study user authentication and identification. The module provides strong foundations in security engineering and enables students to more easily follow other modules in Information Security and in Applied Cryptography.

Requisites:

To be eligible to select this module as optional or elective, a student must: (1) be registered on a programme and year of study for which it is a formally available; and (2) have taken the equivalent of the core modules of a UK-equivalent honours degree (or higher) in the field of computer science (in particular, operating systems, networking, computer architecture.)

Some mathematics are useful to know, e.g., discrete mathematics, probability, logic, partial orders, entropy.

Module deliveries for 2024/25 academic year

Intended teaching term: Term 1 ÌýÌýÌý Postgraduate (FHEQ Level 7)

Teaching and assessment

Mode of study
In person
Methods of assessment
80% Exam
20% Coursework
Mark scheme
Numeric Marks

Other information

Number of students on module in previous year
33
Module leader
Mr Gerard Buckley
Who to contact for more information
cs.pgt-students@ucl.ac.uk

Intended teaching term: Term 1 ÌýÌýÌý Undergraduate (FHEQ Level 7)

Teaching and assessment

Mode of study
In person
Methods of assessment
80% Exam
20% Coursework
Mark scheme
Numeric Marks

Other information

Number of students on module in previous year
8
Module leader
Mr Gerard Buckley
Who to contact for more information
cs.pgt-students@ucl.ac.uk

Last updated

This module description was last updated on 8th April 2024.

Ìý