Cyber Security Fundamentals (H) COMPSCI4062

  • Academic Session: 2023-24
  • School: School of Computing Science
  • Credits: 10
  • Level: Level 4 (SCQF level 10)
  • Typically Offered: Semester 2
  • Available to Visiting Students: Yes

Short Description

This course provides an introduction to the foundational aspects of computer security, such as algorithms and protocols. It also covers ways in which these systems can be attacked and techniques for thwarting these attacks.

Timetable

Three hours per week

Requirements of Entry

Programming (any language)

Networks

Excluded Courses

Cyber Security Fundamentals (M)

Co-requisites

None

Assessment

Examination (80%); Set Exercise: (20%)

Main Assessment In: April/May

Are reassessment opportunities available for all summative assessments? No

Reassessments are normally available for all courses, except those which contribute to the Honours classification. For non Honours courses, students are offered reassessment in all or any of the components of assessment if the satisfactory (threshold) grade for the overall course is not achieved at the first attempt. This is normally grade D3 for undergraduate students and grade C3 for postgraduate students. Exceptionally it may not be possible to offer reassessment of some coursework items, in which case the mark achieved at the first attempt will be counted towards the final course grade. Any such exceptions for this course are described below. 

 

 

The coursework cannot be redone because the nature of the coursework is such that it takes a significant number of days to produce it and this effort is infeasible for supporting the re-doing of such coursework over the summer.

Course Aims

The aim of this course is to provide participants with the opportunity to develop a security mind-set by introducing students to introductory core material in the area of computer security.

Intended Learning Outcomes of Course

By the end of this course students should be able to:

1. Explain the algorithms behind a number of different cryptographic and communication solutions;

2. Explain a number of different security protocols;

3. Evaluate an existing or proposed system in terms of potential vulnerabilities and recommend the most appropriate security solution to apply in a  number of different scenarios;

4. Summarise the key vulnerabilities, threats, and attacks with regards to network security and explain approaches to mitigate these issues.

5. Implement an aspect of cyber security. 

Minimum Requirement for Award of Credits

Students must submit at least 75% by weight of the components (including examinations) of the course's summative assessment.