Module Specification

The information contained in this module specification was correct at the time of publication but may be subject to change, either during the session because of unforeseen circumstances, or following review of the module at the end of the session. Queries about the module should be directed to the member of staff with responsibility for the module.
1. Module Title Cyber Security
2. Module Code COMP232
3. Year Session 2023-24
4. Originating Department Computer Science
5. Faculty Fac of Science & Engineering
6. Semester Second Semester
7. CATS Level Level 5 FHEQ
8. CATS Value 15
9. Member of staff with responsibility for the module
Dr A Lisitsa Computer Science A.Lisitsa@liverpool.ac.uk
10. Module Moderator
11. Other Contributing Departments  
12. Other Staff Teaching on this Module
Mrs J Birtall School of Electrical Engineering, Electronics and Computer Science Judith.Birtall@liverpool.ac.uk
Dr JA Ray Computer Science Jeffrey.Ray@liverpool.ac.uk
13. Board of Studies
14. Mode of Delivery
15. Location Main Liverpool City Campus
    Lectures Seminars Tutorials Lab Practicals Fieldwork Placement Other TOTAL
16. Study Hours 24

    20

    44
17.

Private Study

106
18.

TOTAL HOURS

150
 
    Lectures Seminars Tutorials Lab Practicals Fieldwork Placement Other
19. Timetable (if known)            
 
20. Pre-requisites before taking this module (other modules and/or general educational/academic requirements):

COMP211 Computer Networks
21. Modules for which this module is a pre-requisite:

 
22. Co-requisite modules:

 
23. Linked Modules:

 
24. Programme(s) (including Year of Study) to which this module is available on a mandatory basis:

25. Programme(s) (including Year of Study) to which this module is available on a required basis:

26. Programme(s) (including Year of Study) to which this module is available on an optional basis:

27. Aims
 

1. To provide students with understanding of the main problems in security, confidentiality and privacy in computers and in networks, and the reasons for their importance. 2. To enable students to understand the main approaches adopted for their solution and/or mitigation, together with the strengths and weaknesses of each of these approaches. 3. To develop knowledge and skills in practical applications of available security solutions. 4. To introduce students to theoretical foundations of cybersecurity and attract their attention to the open problems requiring further research.

 
28. Learning Outcomes
 

(LO1) Understand the main problems in security, confidentiality andprivacy in computers and in networks, and the reasons for theirimportance;

 

(LO2) Understand the main approaches adopted for their solutionand/or mitigation, together with the strengths and weaknessesof each of these approaches;

 

(LO3) Understand the main encryption algorithms and security protocols;

 

(LO4) Understand the main principles of prevention, detection and mitigation of computer network security threats

 

(LO5) Appreciate the applications of cryptographic algorithms and security protocols

 

(S1) Problem solving skills

 

(S2) IT skills

 

(S3) Digital scholarship participating in emerging academic, professional and research practices that depend on digital systems

 

(S4) Information technology (application of) adopting, adapting and using digital devices, applications and services

 

(S5) Positive attitude/ self-confidence A 'can-do' approach, a readiness to take part and contribute; openness to new ideas and the drive to make these happen

 

(S6) Problem solving/ critical thinking/ creativity analysing facts and situations and applying creative thinking to develop appropriate solutions.

 

(S7) Learning skills online studying and learning effectively in technology-rich environments, formal and informal

 
29. Teaching and Learning Strategies
 

Teaching Method 1 - Lecture
Description: Formal lectures
Attendance Recorded: Yes

Teaching Method 2 - Laboratory Work
Description: Guided laboratory work sessions
Attendance Recorded: Yes

Standard on-campus delivery
Teaching Method 1 - Lecture
Description: Mix of on-campus/on-line synchronous/asynchronous sessions
Teaching Method 2 - Laboratory Work
Description: On-campus synchronous sessions

 
30. Syllabus
   

1. Brief History of Computer and Network Security (1 lecture). 2. Security and Privacy Overview ( 3 lectures): security attributes, authentication and authorization, access permission, audit, social engineering,  vulnerabilities and attacks. 3. Cryptography (5 lectures): symmetric encryption, public key encryption, hash functions, key exchange protocols, key management, message confidentiality, steganography, partially and fully homomorphic encryption, quantum cryptography, Cryptol specification language for  cryptographic algorithms, Cryptool cryptanalysis tools. 4. Security protocols (3 lectures): key exchange, handshake, SSL/TLS, introduction to verification of protocols. 5. Securing Networks (3 lectures): firewalls, virtual private networks, wireless security, intrusion detection and prevention systems. 6. Insertion attacks (3 lectures): SQL Injection, Buffer Overflow, SSH insertion, Viruses, Worms. 7. Web security (3 lectures): cross site scripting, cross site request forgery, man-in-the browser, web applications penetration testing. 8. Applications of cryptographic algorithms and protocols (3  lectures): voting protocols, blockchain, cryptocurrencies.

 
31. Recommended Texts
  Reading lists are managed at readinglists.liverpool.ac.uk. Click here to access the reading lists for this module.
 

Assessment

32. EXAM Duration Timing
(Semester)
% of
final
mark
Resit/resubmission
opportunity
Penalty for late
submission
Notes
  (232) Exam There is a resit opportunity. This is an anonymous assessment. Assessment Schedule (When) :Summer Exam Session 120 60
33. CONTINUOUS Duration Timing
(Semester)
% of
final
mark
Resit/resubmission
opportunity
Penalty for late
submission
Notes
  (232.3) Practical Assessment 3 There is a resit opportunity. Standard UoL penalty applies for late submission. This is not an anonymous assessment. Assessment Schedule (When) : Semester 2 0 20
  (232.1) Practical Assessment 4 There is a resit opportunity. Standard UoL penalty applies for late submission. This is not an anonymous assessment. Assessment Schedule (When) : Semester 2 0 10
  (232.2) Practical Assessment 2 There is a resit opportunity. Standard UoL penalty applies for late submission. This is not an anonymous assessment. Assessment Schedule (When) : Semester 2 0 10