MODULE DESCRIPTOR
MODULE Computer Systems and Security
TITLE
MODULE CO1562 (L4) JACS I100 CREDIT 20 credits / 10 ECTS
CODE CODE VALUE
DATE OF April 2017 VERSION 1
APPROVAL NUMBER
SCHOOL Physical Sciences and PARTNER Burnley, Carlisle, Runshaw,
Computing INSTITUTION Hugh Baird Colleges
RELATIONSHIP WITH OTHER MODULES
Co-requisites NONE Prerequisites NONE Excluded NONE
Combinations
MODULE AIMS
Gradually, we are becoming more and more dependent on computing systems in our daily lives. The
services provided by these systems, such as online shopping, social networking, mobile banking and
so forth represent the backbone of modern communities. Smart cities, Internet of Things (IoT), smart
vehicles, and smart grids are a few examples of emerging technologies that will shape the future for
coming generations.
Users anticipate these systems to operate exactly as expected and for their services to be secure
and available whenever required. Systems damage or data loss through accident or malicious
attacks can have serious implications including financial losses and even loss of lives.
In such a complicated eco-system, achieving computer systems security and services availability is
no longer the responsibility of computer security specialists. In fact, it is a challenge that spans
across all disciplines in computing. For instance, software engineers, game developers and
information systems engineers ought to implement secure software systems to ensure their reliability
and robustness against attacks such as game cheating and SQL injection. Moreover, network
engineers must consider security measures when building a network to defend and mitigate against
various attacks such as Denial of Service (DoS) and malware. Finally, forensics investigators should
be aware of the current security measures/attacks to investigate the situation and assess the data
breach.
To tackle this multidisciplinary challenge, it is of great importance to develop an understanding of the
different parts of computer systems, their functions, how they are integrated and their vulnerabilities:
this includes computer system architecture, operating systems, computer networks, human element
in those systems, possible threats, and systems security.
This module aims to:
1. Explore the fundamentals of computer architecture and operating systems.
2. Examine a range of recent security threats and data breaches, their consequences on
businesses and potential countermeasures.
3. Create awareness of the importance of complying with law, ethical and privacy issues regarding
any collected data.
4. Discuss recent technologies and their emerging security problems.
5. Make students mindful of their computer security behaviour.
MODULE CONTENT
Computer System Components/Architecture
Top level view of computer functions and interconnection including computer components (e.g.
CPUs,
Primary/Secondary/Cache Memory, I/O devices),
application programs and
users.
Operating Systems Concepts
What Operating Systems (OSs) do? Process/Memory/Storage Management, Process
Synchronisation, Concurrency, Transactions Management, Deadlocks, File Systems and Hardware
Virtualisation.
Key Concepts of Protection and Security
Foundations of Computer Security (Confidentiality, Integrity, Availability, Accountability,
Nonrepudiation, Reliability), Computer Security Objectives, Security Management (Policies,
Measures etc.), Risk & Threat Analysis (Assets, Threats, Vulnerabilities, Attacks). Security Tools
Identification and Authentication, Access Control (User-Centred Security Approach), Cryptography
as a tool (Symmetric/Asymmetric Encryption, Digital Signatures, Secure Hashing), Firewalls,
Detection, Prevention and Recovery Mechanisms, Aftermath (Digital Forensics for investigating,
monitoring and preventing)
Introduction to Computing Systems Security
A subset of the following topics will be considered, depending on topical issues: Linux OR Windows
Security, Database Security, Web Security, Mobile Phone Security, Social Network Security and
Privacy issues and Wireless Network Security.
Emerging Technologies Security, Privacy and Ethical issues
A subset of the following topics will be considered, depending on topical issues: Smart City security
(e.g., recent hacks against smart vehicles), IoT Security, Smart Grids Security, and more as new
emerging technologies come under attacks every day.
INTENDED LEARNING OUTCOMES
On successful completion of this module a student will be able to:
1. Explain the various components of operating systems and their roles.
2. Compare different security threats affecting different computing systems and propose suitable
countermeasures.
3. Describe different tools and techniques to secure a computing system against specific
threats.
4. Identify potential implications of technical decisions
ASSESSMENT METHODS
The method of assessment for this module has been designed to test all the learning outcomes.
Students must demonstrate successful achievement of these learning outcomes to pass the module.
Number of Form of % Size of Category of Learning
Assessments Assessment weighting Assessment/Duration/ assessment Outcomes being
Wordcount (indicative assessed
only)
1 Summary of 50% Approximately 10 Coursework 1, 2, 3
investigation hours preparation
time presented
through a summary
(e.g. Poster) (2000
words equivalent)
1 Report 50% 1200-2000 words Coursework 2, 3, 4
MODULE PASS REQUIREMENTS
To pass this module you must achieve a mark of 40% or above, aggregated across all the
assessments.
APPENDIX
MODULE CODE: CO1562
MODULE TITLE: Computer Systems and Security
LOCATION OF STUDY: Burnley, Carlisle, Runshaw, Hugh Baird Colleges
MODULE M Hashem Eiza
TUTOR(S)
MODULE Semester 1 Semester 2 Semester 3
DELIVERY Year long Semester 1 & 2 Semester 2 & 3
MODULE LEARNING PLAN
LEARNING, TEACHING AND ASSESSMENT STRATEGY
The module examines a useful range of the fundamental aspects of computer systems and security.
Lectures will be delivered on campus to provide the formal taught content including concepts,
techniques and information without digging into the mathematical details of some tools (e.g.,
cryptography).
The practical/tutorial sessions supplement and support the lectures allowing a discovery approach to
learning. Students are expected to engage in research activities for case studies and latest news of
security breaches and hacks. URLs that contain relevant research material will be provided to the
students in support of the syllabus. Students will prepare and share summaries of technologies and
system components.
Students will discuss case studies and explore implications: e.g. considering commercial issues (e.g.
“How much security is enough?”), ethical issues (e.g. “Is it ethical to crack protection on a mobile
phone?”), legal issues (e.g. “Can I connect to my neighbour’s WiFi?”), and social issues (e.g. “Am I at
fault if I don’t protect my device and it is taken over and used maliciously?”)
The assessment is designed to evenly assess the students’ comprehension of theoretical topics
relevant to computer systems and security and of practical elements including tools and methods
needed to achieve computing systems security. This also includes evaluation/assessment of recent
security/data breaches and how to deal with them.
SCHEDULED LEARNING AND TEACHING ACTIVITY No of
hours
Lecture – 1 hour weekly 24
Practical / tutorial – 2 hours weekly 48
TOTAL SCHEDULED LEARNING HOURS 72
GUIDED INDEPENDENT STUDY
Directed reading 40
Preparation for class 24
Preparation for assessment 24
Researching and developing coursework 40
128
TOTAL GUIDED INDEPENDENT STUDY HOURS
200
TOTAL STUDENT LEARNING HOURS
BIBLIOGRAPHY AND LEARNING SUPPORT MATERIAL
The most up to date bibliography for this module is available via the on-line reading list – click on
the link below: http://readinglists.central-lancashire.ac.uk/index
Recommended Books, Journals and Web Sites
Goodrich M. and Tamassia, R. (2011) Introduction to Computer Security, Publisher:
AddisonWesley.
Kim, D. and Solomon, M. (2012) Fundamentals of information systems security, Jones & Bartlett.
Pfleeger C.P., Pfleeger S.L. and Margulies J. (2015) Security in Computing, fifth edition, Prentice
Hall / Pearson Education Inc.
Computers & Security Journal [URL:http://www.sciencedirect.com/science/journal/01674048]
(Accessed December 2016)
INFOSYSSEC Website [URL:http://www.infosyssec.com/infosyssec/index.shtml] (Accessed
December 2016)
Electronic resources available online via Blackboard to support student learning.
Electronic books and journals available online via UCLan’s Discovery search service.