DCU Home | Our Courses | Loop | Registry | Library | Search DCU

Registry

Module Specifications

Archived Version 2022 - 2023

Module Title
Module Code
School

Online Module Resources

NFQ level 9 Credit Rating 7.5
Pre-requisite None
Co-requisite None
Compatibles None
Incompatibles None
Description

This module will give the students a thorough understanding of the theory and practice of computer security. It will cover the basic components of computer security, It will examine different threat vectors, and the policies and mechanisms that address these threat vectors. The module will investigate trust, and its various meanings in the context of computer security. The module will address security assurance and security-by-design.

Learning Outcomes

1. Critically evaluate the basic components of security; confidentiality, integrity and availability
2. Compare the different access control mechanisms.
3. Compare and critically evaluate the various security policies; confidentiality, integrity and hybrid policies.
4. Examine different standards and approaches to control policies and control mechanisms
5. Examine the various authentication models and mechanisms.
6. Identify and understand assurance and security-by-design in the context of computer security.
7. Examine vulnerability analysis and intrusion detection.



Workload Full-time hours per semester
Type Hours Description
Online activity36Lectures
Assignment Completion24No Description
Independent Study120No Description
Total Workload: 180

All module information is indicative and subject to change. For further information,students are advised to refer to the University's Marks and Standards and Programme Specific Regulations at: http://www.dcu.ie/registry/examinations/index.shtml

Indicative Content and Learning Activities

Basic components of Computer Security
Confidentiality, Integrity and Availability. Trust. Assumptions. Foundational Results

Access Control
Types of Access Control policies. Policy languages.

Security Policies
Confidentiality, Integrity and Hybrid policies such as Bell-LaPauda, Biba, Clarke-Wilson, Chinese Walls, Role-Based Access Control.

Security Standards
Various standards used in security (e.g. ISO 29100 family), control policies and control mechanisms, assurance, security-by-design.

Vulnerability Analysis
Penetration testing. Vulnerability classifications.

Intrusion Detection
Principles. Models (Anomaly, Misuse, Specification). Architectures for intrusion detection.

Assessment Breakdown
Continuous Assessment% Examination Weight%
Course Work Breakdown
TypeDescription% of totalAssessment Date
Reassessment Requirement
Resit arrangements are explained by the following categories;
1 = A resit is available for all components of the module
2 = No resit is available for 100% continuous assessment module
3 = No resit is available for the continuous assessment component
Unavailable
Indicative Reading List

  • Matt Bishop: 2019, Computer Security: Art and Science, 2nd, 978-032171233
Other Resources

None
Programme or List of Programmes
Archives: