This page displays the selected Module Descriptor.
Printer friendly version
Session: 2022/23
Last modified: 21/07/2022 16:12:17
Title of Module: Network Security |
---|
Code: COMP10014 |
SCQF Level: 10 (Scottish Credit and Qualifications Framework) |
Credit Points: 20 |
ECTS: 10 (European Credit Transfer Scheme) |
---|
School: | School of Computing, Engineering and Physical Sciences |
---|
Module Co-ordinator: | Jose M.
Alcaraz Calero |
---|
Summary of Module |
---|
This module introduces the student to the fundamental concepts related to Network Security. The following network security concepts are analyzed in detail: security in ethernet network infrastructures, firewalling, proxies, network encapsulation, network authentication and network authorization. The module covers as well concepts related to symetric and asymetric cryptography, PKI protocols, key exchange and digital signature. Typical vulnerabilities are studied from the hackers’ point of view and then from the Administrators perspective so that these vulnerabilities can be either stopped or prevented.
The module is complemented with labs where the concepts explained in lectures can be put in practices in order to get deeper understanding on the fundamentals of how security in IP networks is implemented.
Additionaly, this module will work to develop a number of the key 'I am UWS' Graduate Attributes to make those who complete this module:
Universal
- Critical Thinker
- Ethically-minded
- Research-minded
Work Ready
- Problem-Solver
- Effective Communicator
- Ambitious
Successful
- Autonomous
- Resilient
- Driven
The scope of the module includes the following topics:
- Security of the Network Infrastructure
- Firewalls
- Cryptography
- Intrusion Detection and Prevention
- PKI Protocols, Key Exchange and Digital Signature
- Network Encapsulation
- Network Authentication and Authorization
|
Module Delivery Method |
---|
Face-To-Face | Blended | Fully Online | HybridC | HybridO | Work-based Learning |
|  |  | | | |
Face-To-Face
Term used to describe the traditional classroom environment where the students and the lecturer meet synchronously in the same room for the whole provision.
Blended
A mode of delivery of a module or a programme that involves online and face-to-face delivery of learning, teaching and assessment activities, student support and feedback. A programme may be considered “blended” if it includes a combination of face-to-face, online and blended modules. If an online programme has any compulsory face-to-face and campus elements it must be described as blended with clearly articulated delivery information to manage student expectations
Fully Online
Instruction that is solely delivered by web-based or internet-based technologies. This term is used to describe the previously used terms distance learning and e learning.
HybridC
Online with mandatory face-to-face learning on Campus
HybridO
Online with optional face-to-face learning on Campus
Work-based Learning
Learning activities where the main location for the learning experience is in the workplace.
|
Term(s) for Module Delivery |
---|
(Provided viable student numbers permit).
|
Term 1 |  | Term 2 | | Term 3 | |
[Top of Page]
Learning Outcomes: (maximum of 5 statements) |
---|
On successful completion of this module the student will be able to:
L1.
Demonstrate a critical understanding of security concepts
L2.
Demonstrate detailed knowledge of Network Security Techniques and Technologies
L3.
Evaluate the security threats to specific network
L4.
Configure security measures to meet a given policy |
Employability Skills and Personal Development Planning (PDP) Skills |
---|
SCQF Headings |
During completion of this module, there will be an opportunity to achieve
core skills in:
|
---|
Knowledge and Understanding (K and U) |
SCQF Level 10.
The aim of the module is to enable the student to acquire the knowledge and understanding of Network Security through lectures, group practicals and guided self study. |
Practice: Applied Knowledge and Understanding |
SCQF Level 10.
Knowledge gained will be demonstrated through successful completion of coursework, laboratories and exams. |
Generic Cognitive skills |
SCQF Level 10.
Through the development of strategies to secure a network as the student works through the lab work they will be able to apply these methodologies to other aspect of their work. |
Communication, ICT and Numeracy Skills |
SCQF Level 10.
Throughout the lab program students will have to work together in the detection and implementation of security. Students will then have to write their own evaluation of the lab work so will have to use word processing, capturing and formatting of images and other computing skills. |
Autonomy, Accountability and Working with others |
SCQF Level 10.
Various deadlines are imposed for the handing in of course work which requires the student to manage their time. The lab work has a large component of group working so the student will learn how to work within a group yet also fulfill their own personal work schedule. |
* Indicates that module descriptor is not published.
[Top of Page]
Learning and Teaching |
---|
Lecturers are used to introduce the material, allowing the students to gain an appreciation of the topics. Tutorial discussions and practical work in a laboratory setting are there to deepen the students learning. Web-based materials are also provided to provide additional support to students. |
Learning Activities During completion of this module, the learning activities undertaken to
achieve the module learning outcomes are stated below:
| Student Learning Hours (Normally totalling 200 hours): (Note: Learning hours include both contact hours and hours spent on other learning activities) |
Lecture/Core Content Delivery | 22 |
Laboratory/Practical Demonstration/Workshop | 22 |
Independent Study | 156 |
| 200
Hours Total
|
**Indicative Resources: (eg. Core text, journals, internet
access)
|
---|
The following materials form essential underpinning for the module content
and ultimately for the learning outcomes:
“Hacking Exposed” 5e by S. McClure et al, McGraw-Hill Osborne, 2005, ISBN 0072260815
“Applied Cryptography” 2e by B. Schneier, John Wiley, 1996, ISBN 0471117099
“Secrets and Lies” by B. Schneier, Hungry Minds Inc,U.S., 2004, ISBN 0471453803
"Introduction to Computer Networks and Cybersecurity by Cnwan-Hwa (John) Wu, J David Irwin ISBN 978-1-4665-7213-3
|
(**N.B. Although reading lists should include current publications,
students are advised (particularly for material marked with an asterisk*) to
wait until the start of session for confirmation of the most up-to-date
material)
|
Engagement Requirements |
---|
In line with the Academic Engagement Procedure, Students are defined as academically engaged if they are regularly engaged with timetabled teaching sessions, course-related learning resources including those in the Library and on the relevant learning platform, and complete assessments and submit these on time. Please refer to the Academic Engagement Procedure at the following link: Academic engagement procedure |
[Top of Page]
Supplemental Information
Programme Board | Computing |
---|
Assessment Results (Pass/Fail) |
No
|
---|
Subject Panel | Business & Applied Computing |
---|
Moderator | Steve Eager |
---|
External Examiner | R Khusainov |
---|
Accreditation Details | This module is accredited by BCS as part of a number of specified programmes. |
---|
Version Number | 4.03 |
---|
[Top of Page]
Assessment: (also refer to Assessment Outcomes Grids below) |
---|
Final Exam (60%) |
Course Work (40%) |
(N.B. (i) Assessment Outcomes Grids for the module
(one for each component) can be found below which clearly demonstrate how the learning outcomes of the module
will be assessed.
(ii) An indicative schedule listing approximate times
within the academic calendar when assessment is likely to feature will be
provided within the Student Handbook.)
|
Assessment Outcome Grids (Footnote A.)
Footnotes
A. Referred to within Assessment Section above
B. Identified in the Learning Outcome Section above
[Top of Page]
Note(s):
- More than one assessment method can be used to assess individual learning outcomes.
-
Schools are responsible for determining student contact hours. Please refer to University Policy on contact hours (extract contained within section 10 of the Module Descriptor guidance note).
This will normally be variable across Schools, dependent on Programmes &/or Professional requirements.
|
Equality and Diversity |
---|
The University policies on equality and diversity will apply to this module: the content and assessment are based on the ability to communicate in English but are otherwise culture-neutral.
In order for the student to complete this module an element of Laboratory work is required. Lectures should be attended as should the participation in class discussions.
When a student discloses a disability an enabling support advisor will agree the appropriate adjustments to be made, consulting with the module coordinator if necessary.Further guidance available from Student Services, School Disability Co-ordinators or the University’s Equality and Diversity Co-ordinator. UWS Equality and Diversity Policy |
(N.B. Every effort
will be made by the University to accommodate any equality and diversity issues
brought to the attention of the School)
|