Module Specifications.
Current Academic Year 2024 - 2025
All Module information is indicative, and this portal is an interim interface pending the full upgrade of Coursebuilder and subsequent integration to the new DCU Student Information System (DCU Key).
As such, this is a point in time view of data which will be refreshed periodically. Some fields/data may not yet be available pending the completion of the full Coursebuilder upgrade and integration project. We will post status updates as they become available. Thank you for your patience and understanding.
Date posted: September 2024
| |||||||||||||||||||||||||||||||||||||||||||
Repeat examination |
|||||||||||||||||||||||||||||||||||||||||||
Description This module will give the students a thorough understanding of the theory and practice of computer security. It will cover the basic components of computer security, It will examine different threat vectors, and the policies and mechanisms that address these threat vectors. The module will investigate trust, and its various meanings in the context of computer security. The module will address security assurance and security-by-design. | |||||||||||||||||||||||||||||||||||||||||||
Learning Outcomes 1. Critically evaluate the basic components of security; confidentiality, integrity and availability 2. Compare the different access control mechanisms. 3. Compare and critically evaluate the various security policies; confidentiality, integrity and hybrid policies. 4. Examine different standards and approaches to control policies and control mechanisms 5. Examine the various authentication models and mechanisms. 6. Identify and understand assurance and security-by-design in the context of computer security. 7. Examine vulnerability analysis and intrusion detection. | |||||||||||||||||||||||||||||||||||||||||||
All module information is indicative and subject to change. For further information,students are advised to refer to the University's Marks and Standards and Programme Specific Regulations at: http://www.dcu.ie/registry/examinations/index.shtml |
|||||||||||||||||||||||||||||||||||||||||||
Indicative Content and Learning Activities
Basic components of Computer SecurityConfidentiality, Integrity and Availability. Trust. Assumptions. Foundational ResultsAccess ControlTypes of Access Control policies. Policy languages.Security PoliciesConfidentiality, Integrity and Hybrid policies such as Bell-LaPauda, Biba, Clarke-Wilson, Chinese Walls, Role-Based Access Control.Security StandardsVarious standards used in security (e.g. ISO 29100 family), control policies and control mechanisms, assurance, security-by-design.Vulnerability AnalysisPenetration testing. Vulnerability classifications.Intrusion DetectionPrinciples. Models (Anomaly, Misuse, Specification). Architectures for intrusion detection. | |||||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||||
Indicative Reading List
| |||||||||||||||||||||||||||||||||||||||||||
Other Resources None | |||||||||||||||||||||||||||||||||||||||||||