DCU Home | Our Courses | Loop | Registry | Library | Search DCU

Module Specifications..

Current Academic Year 2023 - 2024

Please note that this information is subject to change.

Module Title Computer Security
Module Code CA6002I
School School of Computing
Module Co-ordinatorSemester 1: Irina Tal
Semester 2: Irina Tal
Autumn: Irina Tal
Module TeachersIrina Tal
NFQ level 9 Credit Rating 7.5
Pre-requisite None
Co-requisite None
Compatibles None
Incompatibles None
Repeat examination

This module will give the students a thorough understanding of the theory and practice of computer security. It will cover the basic components of computer security, It will examine different threat vectors, and the policies and mechanisms that address these threat vectors. The module will investigate trust, and its various meanings in the context of computer security. The module will address security assurance and security-by-design.

Learning Outcomes

1. Critically evaluate the basic components of security; confidentiality, integrity and availability
2. Compare the different access control mechanisms.
3. Compare and critically evaluate the various security policies; confidentiality, integrity and hybrid policies.
4. Examine different standards and approaches to control policies and control mechanisms
5. Examine the various authentication models and mechanisms.
6. Identify and understand assurance and security-by-design in the context of computer security.
7. Examine vulnerability analysis and intrusion detection.

Workload Full-time hours per semester
Type Hours Description
Online activity36Lectures
Assignment Completion24No Description
Independent Study120No Description
Total Workload: 180

All module information is indicative and subject to change. For further information,students are advised to refer to the University's Marks and Standards and Programme Specific Regulations at: http://www.dcu.ie/registry/examinations/index.shtml

Indicative Content and Learning Activities

Basic components of Computer Security
Confidentiality, Integrity and Availability. Trust. Assumptions. Foundational Results

Access Control
Types of Access Control policies. Policy languages.

Security Policies
Confidentiality, Integrity and Hybrid policies such as Bell-LaPauda, Biba, Clarke-Wilson, Chinese Walls, Role-Based Access Control.

Security Standards
Various standards used in security (e.g. ISO 29100 family), control policies and control mechanisms, assurance, security-by-design.

Vulnerability Analysis
Penetration testing. Vulnerability classifications.

Intrusion Detection
Principles. Models (Anomaly, Misuse, Specification). Architectures for intrusion detection.

Assessment Breakdown
Continuous Assessment40% Examination Weight60%
Course Work Breakdown
TypeDescription% of totalAssessment Date
AssignmentThe assessment will involve various tasks such as the analysis of a Computer System in terms of threats and appropriate policies and mechanisms to address these threats; code analysis from the perspective of applying secure coding standards, vulnerability analysis.40%n/a
Reassessment Requirement Type
Resit arrangements are explained by the following categories;
1 = A resit is available for all components of the module
2 = No resit is available for 100% continuous assessment module
3 = No resit is available for the continuous assessment component
This module is category 1
Indicative Reading List

  • Matt Bishop: 2019, Computer Security: Art and Science, 2nd, 978-032171233
Other Resources

Programme or List of Programmes
MCMM.Sc. in Computing

My DCU | Loop | Disclaimer | Privacy Statement