Module Details

The information contained in this module specification was correct at the time of publication but may be subject to change, either during the session because of unforeseen circumstances, or following review of the module at the end of the session. Queries about the module should be directed to the member of staff with responsibility for the module.
Title Cyber Security
Code COMP232
Coordinator Dr A Lisitsa
Computer Science
A.Lisitsa@liverpool.ac.uk
Year CATS Level Semester CATS Value
Session 2022-23 Level 5 FHEQ Second Semester 15

Aims

1. To provide students with understanding of the main problems in security, confidentiality and privacy in computers and in networks, and the reasons for their importance. 2. To enable students to understand the main approaches adopted for their solution and/or mitigation, together with the strengths and weaknesses of each of these approaches. 3. To develop knowledge and skills in practical applications of available security solutions. 4. To introduce students to theoretical foundations of cybersecurity and attract their attention to the open problems requiring further research.


Learning Outcomes

(LO1) Understand the main problems in security, confidentiality andprivacy in computers and in networks, and the reasons for theirimportance;

(LO2) Understand the main approaches adopted for their solutionand/or mitigation, together with the strengths and weaknessesof each of these approaches;

(LO3) Understand the main encryption algorithms and security protocols;

(LO4) Understand the main principles of prevention, detection and mitigation of computer network security threats

(LO5) Appreciate the applications of cryptographic algorithms and security protocols

(S1) Problem solving skills

(S2) IT skills

(S3) Digital scholarship participating in emerging academic, professional and research practices that depend on digital systems

(S4) Information technology (application of) adopting, adapting and using digital devices, applications and services

(S5) Positive attitude/ self-confidence A 'can-do' approach, a readiness to take part and contribute; openness to new ideas and the drive to make these happen

(S6) Problem solving/ critical thinking/ creativity analysing facts and situations and applying creative thinking to develop appropriate solutions.

(S7) Learning skills online studying and learning effectively in technology-rich environments, formal and informal


Syllabus

 

1. Brief History of Computer and Network Security (1 lecture). 2. Security and Privacy Overview ( 3 lectures): security attributes, authentication and authorization, access permission, audit, social engineering,  vulnerabilities and attacks. 3. Cryptography (5 lectures): symmetric encryption, public key encryption, hash functions, key exchange protocols, key management, message confidentiality, steganography, partially and fully homomorphic encryption, quantum cryptography, Cryptol specification language for  cryptographic algorithms, Cryptool cryptanalysis tools. 4. Security protocols (3 lectures): key exchange, handshake, SSL/TLS, introduction to verification of protocols. 5. Securing Networks (3 lectures): firewalls, virtual private networks, wireless security, intrusion detection and prevention systems. 6. Insertion attacks (3 lectures): SQL Injection, Buffer Overflow, SSH insertion, Viruses, Worms. 7. Web security (3 lectures): cross site scripting, cross site request forgery, man-in-the browser, web applications penetration testing. 8. Applications of cryptographic algorithms and protocols (3  lectures): voting protocols, blockchain, cryptocurrencies.


Teaching and Learning Strategies

Teaching Method 1 - Lecture
Description: Formal lectures
Attendance Recorded: Yes

Teaching Method 2 - Laboratory Work
Description: Guided laboratory work sessions
Attendance Recorded: Yes

Due to Covid-19, in 2021/22, one or more of the following delivery methods will be implemented based on the current local conditions.

(a) Hybrid delivery
Teaching Method 1 - Lecture
Description: Mix of on-campus/on-line synchronous/asynchronous sessions
Teaching Method 2 - Laboratory Work
Description: Mix of on-campus/on-line synchronous/asynchronous sessions

(b) Fully online delivery and assessment
Teaching Method 1 - Lecture
Description: On-line synchronous/asynchronous lectures
Teaching Method 2 - Laboratory Work
Description: On-line synchronous/asynchronous sessions

(c) Standard on-campus delivery
Teaching Method 1 - Lecture
Description: Mix of on-campus/on-line synchronous/asynchronous sessions
Teaching Method 2 - Laboratory Work
Description: On-campus synchronous sessions


Teaching Schedule

  Lectures Seminars Tutorials Lab Practicals Fieldwork Placement Other TOTAL
Study Hours 24

    20

    44
Timetable (if known)              
Private Study 106
TOTAL HOURS 150

Assessment

EXAM Duration Timing
(Semester)
% of
final
mark
Resit/resubmission
opportunity
Penalty for late
submission
Notes
(232) Exam There is a resit opportunity. This is an anonymous assessment. Assessment Schedule (When) :Summer Exam Session  120    60       
CONTINUOUS Duration Timing
(Semester)
% of
final
mark
Resit/resubmission
opportunity
Penalty for late
submission
Notes
CA3 Practical Assessment 3 There is a resit opportunity. Standard UoL penalty applies for late submission. This is not an anonymous assessment. Assessment Schedule (When) : Semester 2    20       
CA2 Practical Assessment 2 There is a resit opportunity. Standard UoL penalty applies for late submission. This is not an anonymous assessment. Assessment Schedule (When) : Semester 2    10       
CA1 Practical Assessment 1 There is a resit opportunity. Standard UoL penalty applies for late submission. This is not an anonymous assessment. Assessment Schedule (When) : Semester 2    10       

Recommended Texts

Reading lists are managed at readinglists.liverpool.ac.uk. Click here to access the reading lists for this module.