1.
| [Foundation]
Be able to understand the principles and objectives of information security, encryption, cyber-attacks and defense. |
2.
| [Model]
Be able to understand security models and to apply the model to achieve the security objectives. |
3.
| [Design]
Be able to understand the basic principles of security design and to apply the principles. |
4.
| [Application]
Be able to understand the security issues of a real-life Internet applications. |
5.
| [Application development]
Be able to implement a practical Internet application in a secure manner. |
Mapping from Course Learning Outcomes to Programme Learning Outcomes
| PLO a | PLO b | PLO c | PLO d | PLO e | PLO f | PLO g | PLO h | PLO i | PLO j |
CLO 1 | | | T | | | T | | T | | |
CLO 2 | | T | T | | | | | | | T |
CLO 3 | T | | | T | | | | | T | T |
CLO 4 | | | | T | | T | | T | | T |
CLO 5 | | | T | T | T | | T | | | |
T - Teach, P - Practice
For BEng(CompSc) Programme Learning Outcomes, please refer to
here.
|
Syllabus |
Calendar Entry:
This course introduces the principles, mechanisms and implementation of cyber security and data protection. Knowledge about the attack and defense are included. Topics include notion and terms of cyber security; network and Internet security, introduction to encryption: classic and modern encryption technologies; authentication methods; access control methods; cyber attacks and defenses (e.g. malware, DDoS).
|
Detailed Description:
Computer and network security |
Mapped to CLOs
|
Introduction to cryptography | 1 |
Symmetric key cryptography and public key cryptography | 1 |
Authentication techniques | 2, 3 |
Access control methods | 2, 3 |
Network and Internet security and protection | 1 |
Application and web security | 4, 5 |
Analysis and models of secure systems | 2, 3 |
Cyber threat assessment and penetration testing | 4, 5 |
Mobile code security | 4, 5 |
|
Assessment:
Continuous Assessment:
50% Written Examination:
50%
|
Teaching Plan |
Please refer to the corresponding Moodle course.
|
Moodle Course(s) |
|