Registry
Module Specifications
Archived Version 2022 - 2023
| |||||||||||||||||||||||||||||||||||||
Description This module will give the students a thorough understanding of the theory and practice of computer security. It will cover the basic components of computer security, It will examine different threat vectors, and the policies and mechanisms that address these threat vectors. The module will investigate trust, and its various meanings in the context of computer security. The module will address security assurance and security-by-design. | |||||||||||||||||||||||||||||||||||||
Learning Outcomes 1. Critically evaluate the basic components of security; confidentiality, integrity and availability 2. Compare the different access control mechanisms. 3. Compare and critically evaluate the various security policies; confidentiality, integrity and hybrid policies. 4. Examine different standards and approaches to control policies and control mechanisms 5. Examine the various authentication models and mechanisms. 6. Identify and understand assurance and security-by-design in the context of computer security. 7. Examine vulnerability analysis and intrusion detection. | |||||||||||||||||||||||||||||||||||||
All module information is indicative and subject to change. For further information,students are advised to refer to the University's Marks and Standards and Programme Specific Regulations at: http://www.dcu.ie/registry/examinations/index.shtml |
|||||||||||||||||||||||||||||||||||||
Indicative Content and
Learning Activities Basic components of Computer SecurityConfidentiality, Integrity and Availability. Trust. Assumptions. Foundational ResultsAccess ControlTypes of Access Control policies. Policy languages.Security PoliciesConfidentiality, Integrity and Hybrid policies such as Bell-LaPauda, Biba, Clarke-Wilson, Chinese Walls, Role-Based Access Control.Security StandardsVarious standards used in security (e.g. ISO 29100 family), control policies and control mechanisms, assurance, security-by-design.Vulnerability AnalysisPenetration testing. Vulnerability classifications.Intrusion DetectionPrinciples. Models (Anomaly, Misuse, Specification). Architectures for intrusion detection. | |||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||
Indicative Reading List
| |||||||||||||||||||||||||||||||||||||
Other Resources None | |||||||||||||||||||||||||||||||||||||
Programme or List of Programmes | |||||||||||||||||||||||||||||||||||||
Archives: |
|