Information Security

University of Reading

Course Description

  • Course Name

    Information Security

  • Host University

    University of Reading

  • Location

    Reading, England

  • Area of Study

    Computer Science, Information Studies

  • Language Level

    Taught In English

  • Prerequisites

    Pre-requisites:
    Non-modular pre-requisites:

  • Course Level Recommendations

    Upper

    ISA offers course level recommendations in an effort to facilitate the determination of course levels by credential evaluators.We advice each institution to have their own credentials evaluator make the final decision regrading course levels.

    Hours & Credits

  • ECTS Credits

    5
  • Recommended U.S. Semester Credits
    3
  • Recommended U.S. Quarter Units
    4
  • Overview

    Summary module description:

    Aims:
    The module covers the major threats and risks that affect the security of a network and the systems that rely on it (network security), and the major threats to data in both structured and unstructured form (data security). It aims to counter these threats and to minimise risks with technical mechanisms.

    Assessable learning outcomes:
    On completion of this module, the student should be able to:
    1. Identify ways of countering different types of threat
    2. Produce strategies to minimise risks of security breaches in a range of network environments and data storage systems
    3. Critically analyse the shortcomings of a range of security strategies
    4. Describe and apply the techniques used to penetrate a Web application
    5. Develop appropriate security policies and network architectures to minimise the threats from network intrusion
    6. Understand the different types of threat posed by different classes of hacker and by different categories of malware
    7. Describe and apply the principles of key cryptography and message digests
    8. Understand the role cryptography plays in security protocols such as SSL
    9. Apply appropriate access controls and authentication techniques at different levels
    10. Critically analyse the security and privacy issues surrounding unstructured data in a variety of different scenarios, with an in-depth focus on securing such data in Web applications
    11. Critically analyse the security and privacy issues surrounding structured data, including the techniques used to secure file storage and databases

    Additional outcomes:
    1. Recognise the role of privacy in computer security
    2. Recognise the role of ethics in computing

    Outline content:
    The module comprises three parts:

    Overview of information security

    This part of the module provides an overview of the issues involved in information security in general, focusing on cryptography, the theories underlying computer security, authentication and access control.

    Network Security

    This part of the module focuses on the role the network plays in computer security, including its vulnerabilities, and the techniques that can be used to make the network secure. The part covers security issues related to general networks (e.g. port scanning, Denial of Service, etc.), the Web (e.g. SQL injection, XSS, CSRF, directory traversal attacks, etc.), and system threats in general, such as viruses, worms and Trojan horses. It also covers security controls such as firewalls, secure network protocols such as SSL and IPSec, and Intrusion Detection Systems.

    Data Security

    This part of the module focuses on the security of structured data (i.e. data stored in file storage systems or in databases) and unstructured data (i.e. data outside of a storage system that is manually used and transformed, and which is frequently in various states of rest, transit and use). The part covers the techniques that should be used to secure access to structured data, to prevent its accidental loss and to prevent it from being read by intruders; it also covers the techniques used to secure unstructured data, with particular emphasis made on Web applications, one of the most commonly used sources of unstructured data, yet one of the most notoriously difficult systems to secure. This part brings together the previous two parts, and shows how the theories and techniques used in Computer and Network Security can be applied to ensure the security of structured and unstructured data.

    Brief description of teaching and learning methods:
    There will be two, one hour lectures each week. The lectures will cover the theoretical aspects of the course, reinforced by demonstrations and group discussions in the seminars. The seminars will also be used for question and answer sessions on the assignment. There will be a number of revision lectures in the summer term.

    Summative Assessment Methods:
    Written exam 70%
    Set exercise 30%

    Other information on summative assessment:

    Formative assessment methods:

    Penalties for late submission:
    Penalties for late submission on this module are in accordance with the University policy.
    The following penalties will be applied to coursework which is submitted after the deadline for submission:

    where the piece of work is submitted up to one calendar week after the original deadline (or any formally agreed extension to the deadline): 10% of the total marks available for the piece of work will be deducted from the mark;
    where the piece of work is submitted more than one calendar week after the original deadline (or any formally agreed extension to the deadline): a mark of zero will be recorded.
    You are strongly advised to ensure that coursework is submitted by the relevant deadline. You should note that it is advisable to submit work in an unfinished state rather than to fail to submit any work.
    (Please refer to the Undergraduate Guide to Assessment for further information: http://www.reading.ac.uk/internal/exams/student/exa-guideUG.aspx)
    The Module Convener will apply the following penalties for work submitted late, in accordance with the University policy.
    where the piece of work is submitted up to one calendar week after the original deadline (or any formally agreed extension to the deadline): 10% of the total marks available for the piece of work will be deducted from the mark for each working day (or part thereof) following the deadline up to a total of five working days;
    where the piece of work is submitted more than five working days after the original deadline (or any formally agreed extension to the deadline): a mark of zero will be recorded.

    The University policy statement on penalties for late submission can be found at: http://www.reading.ac.uk/web/FILES/qualitysupport/penaltiesforlatesubmission.pdf
    You are strongly advised to ensure that coursework is submitted by the relevant deadline. You should note that it is advisable to submit work in an unfinished state rather than to fail to submit any work.

    Length of examination:
    One 2-hour examination paper in May/June.

    Requirements for a pass:
    40%

Course Disclaimer

Courses and course hours of instruction are subject to change.

Some courses may require additional fees.

Credits earned vary according to the policies of the students' home institutions. According to ISA policy and possible visa requirements, students must maintain full-time enrollment status, as determined by their home institutions, for the duration of the program.

ECTS (European Credit Transfer and Accumulation System) credits are converted to semester credits/quarter units differently among U.S. universities. Students should confirm the conversion scale used at their home university when determining credit transfer.

Please reference fall and spring course lists as not all courses are taught during both semesters.

Please note that some courses with locals have recommended prerequisite courses. It is the student's responsibility to consult any recommended prerequisites prior to enrolling in their course.

X

This site uses cookies to store information on your computer. Some are essential to make our site work; others help us improve the user experience. By using the site, you consent to the placement of these cookies.

Read our Privacy Policy to learn more.

Confirm