Module Details |
The information contained in this module specification was correct at the time of publication but may be subject to change, either during the session because of unforeseen circumstances, or following review of the module at the end of the session. Queries about the module should be directed to the member of staff with responsibility for the module. |
Title | PRIVACY AND SECURITY | ||
Code | COMP522 | ||
Coordinator |
Dr A Lisitsa Computer Science A.Lisitsa@liverpool.ac.uk |
||
Year | CATS Level | Semester | CATS Value |
Session 2019-20 | Level 7 FHEQ | First Semester | 15 |
Aims |
|
The aims of this module are: to introduce students to the major problems and solution approaches in the area of computer and Internet privacy, confidentiality and security. to provide a theoretical framework for subsequent research in these challenging areas. |
Learning Outcomes |
|
(LO1) At the end of the module, students should understand the main problems in security, confidentiality and privacy in conputers and in networks, and the reasons for their importance. |
|
(LO2) At the end of the module, students should understand the main approaches adopted for their solution and/or mitigation, together with the strengths and weaknesses of each of these approaches |
|
(LO3) At the end of the module, students should understand the main encryption algorithms and protocols |
|
(LO4) At the end of the module, students should appreciate the application of encryption algorithms to secure messaging, key distribution and exchange, authentication and electronic payment systems |
|
(LO5) At the end of the module, students should understand the use of epistemic logics for formal modeling of security and privacy protocols. |
|
(LO6) At the end of the module, students should understand the legal and ethical issues related to securit, confidentiality and privacy. |
|
(S1) Adaptability |
|
(S2) Problem solving skills |
|
(S3) Numeracy |
|
(S4) IT skills |
|
(S5) Commercial awareness |
|
(S6) Ethical awareness |
|
(S7) Lifelong learning skills |
Syllabus |
|
Identification and authentication: Monitoring: Protocols: Attacks and defences: Legal and ethical issues: national anti-terror ism legislation, the USA clipper chip. Include a reference to legal and ethical issues (UK data protection act, European data protection and privacy legislation) covered in the research methods module COMP516. Future directions: |
Teaching and Learning Strategies |
|
Teaching Method 1 - Lecture Description: Lectures Teaching Method 2 - Practical Description: Computer labs |
Teaching Schedule |
Lectures | Seminars | Tutorials | Lab Practicals | Fieldwork Placement | Other | TOTAL | |
Study Hours |
30 |
10 |
40 | ||||
Timetable (if known) | |||||||
Private Study | 110 | ||||||
TOTAL HOURS | 150 |
Assessment |
||||||
EXAM | Duration | Timing (Semester) |
% of final mark |
Resit/resubmission opportunity |
Penalty for late submission |
Notes |
CONTINUOUS | Duration | Timing (Semester) |
% of final mark |
Resit/resubmission opportunity |
Penalty for late submission |
Notes |
Assessment 2 There is a resit opportunity. Standard UoL penalty applies for late submission. This is not an anonymous assessment. Assessment Schedule (When) :Semester 1 | 36 hours for all CAs | 12 | ||||
Assignments 1 and 2 There is a resit opportunity. Standard UoL penalty applies for late submission. This is not an anonymous assessment. Assessment Schedule (When) :Semester 1 | 36 hours for all CAs | 12 |
Recommended Texts |
|
Reading lists are managed at readinglists.liverpool.ac.uk. Click here to access the reading lists for this module. |