Authorised by Academic Registrar, April 1996
Objectives At the completion of this subject students should be able to identify the threats to the security of an information system, including worms and viruses; be able to differentiate among the range of security techniques and know how to use them; understand and assess the performance of commonly used security algorithms and protocols; and describe a range of access control policies and select appropriate mechanisms to implement each of the policies.
Synopsis This subject provides students with the knowledge and skills necessary to identify security problems which may arise in an information system and to explore measures that may be used to prevent or resolve such security problems. Topics covered include: security threats and counter-measures in a computing and communications system; standard security techniques including private key and public key ciphers, stream ciphers, digital signatures, one-way hash functions, entity authentication and identification, and smart cards; firewalls and secure computer networks; database security; security in electronic commerce including EDI and electronic mail; computer viruses; protection of computer software.
Assessment Examination (3 hours): 40% + Practical work: 60%