Latest Module Specifications
Current Academic Year 2025 - 2026
No Banner module data is available
| |||||||||||||||||||||||||||||||||||||||||
|
Description This module will give the students a thorough understanding of the theory and practice of computer security. It will cover the basic components of computer security, It will examine different threat vectors, and the policies and mechanisms that address these threat vectors. The module will investigate trust, and its various meanings in the context of computer security. The module will address security assurance and security-by-design. | |||||||||||||||||||||||||||||||||||||||||
|
Learning Outcomes 1. Critically evaluate the basic components of security; confidentiality, integrity and availability 2. Compare the different access control mechanisms. 3. Compare and critically evaluate the various security policies; confidentiality, integrity and hybrid policies. 4. Examine different standards and approaches to control policies and control mechanisms 5. Examine the various authentication models and mechanisms. 6. Identify and understand assurance and security-by-design in the context of computer security. 7. Examine vulnerability analysis and intrusion detection. | |||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||
|
All module information is indicative and subject to change. For further information,students are advised to refer to the University's Marks and Standards and Programme Specific Regulations at: http://www.dcu.ie/registry/examinations/index.shtml |
|||||||||||||||||||||||||||||||||||||||||
|
Indicative Content and Learning Activities
Basic components of Computer Security Confidentiality, Integrity and Availability. Trust. Assumptions. Foundational Results Access Control Types of Access Control policies. Policy languages. Security Policies Confidentiality, Integrity and Hybrid policies such as Bell-LaPauda, Biba, Clarke-Wilson, Chinese Walls, Role-Based Access Control. Security Standards Various standards used in security (e.g. ISO 29100 family), control policies and control mechanisms, assurance, security-by-design. Vulnerability Analysis Penetration testing. Vulnerability classifications. Intrusion Detection Principles. Models (Anomaly, Misuse, Specification). Architectures for intrusion detection. | |||||||||||||||||||||||||||||||||||||||||
|
Indicative Reading List Books:
Articles: None | |||||||||||||||||||||||||||||||||||||||||
|
Other Resources None | |||||||||||||||||||||||||||||||||||||||||