Gwybodaeth am Coronafirws (Covid-19)

Modiwl ICP-3011:
Computer & Network Security

Ffeithiau’r Modiwl

Rhedir gan School of Computer Science and Electronic Engineering

10 Credyd neu 5 Credyd ECTS

Semester 1

Trefnydd: Dr Cameron Gray

Amcanion cyffredinol

To give an understanding of the issues surrounding security in computing, networks and the interconnected world and experience in how to defend their systems against attacks. To expose students to common themes and activities required to secure programs, machines and networks. To give practical experience of the processes and mindset that attackers will use to defeat system security. To present the concept of layered/blended responses.

Cynnwys cwrs

  • To differentiate between white and black hat hackers and understand the aims of them.

  • Definitions and usage of Authentication, Authorisation and Accounting; the weaknesses of various schemes and issues surrounding the storage of data.

  • Overview of ways in which attacks can be made against networks / computer systems. Methods hackers use to attempt a break in. Wireless networks and their problems

  • The layered protection model (Onion Response) and methods that allow networks to be protected

  • Understanding of how encryption works, the two major ‘forms’ of encryption, the provision of confidentiality and integrity guarantees.

  • Data protection, access to sensitive data and understanding the tactics of social engineers

Cyswllt Canlyniad dysgu i Meini Prawf







Understand the background to hacking and cracking and the popular terms used

Can explain the terms black hat and white hat hackers Can also explain the difference between cracking and hacking Can explain in detail the culture and motivations of the aforementioned people

Explain the ‘3 As’ and their appropriate applications within a business and technical context.

Can understand the terms social engineering and data protection and what issues arise form both Explain policies involved in ensuring data is handled correctly Can give clear examples of all points and explain their desired outcomes

Explain networks/computer systems vulnerabilities

Can describe common vulnerabilities. Can explain common vulnerabilities including how the issue was created. Explains common vulnerabilities, including cause and selects appropriate methods to mitigate them.

Understand layered Network protections, the rationale for using them and the popular terms used

Be able to describe several tools used for discovering problems Explain how using these tools could help the administrator secure their system Can explain the possible vulnerabilities networks or systems can have

Explain the basic principles of encryption, confidentiality and integrity.

Can explain the terms firewalls and IDS and how they differ Able to display a deeper knowledge of the two’s functionality and abilities Can give examples of how both would work together in a network

Understand Computer Ethics & Social Engineering

Describes ethical factors and methods of social engineering. Describes, using appropriate examples ethical factors and social engineering techniques. Describes ethical factors, argues appropriate cases for actions. Explains social engineering techniques and attacks with supporting theory.

Dulliau asesu

Math Enw Disgrifiad Pwysau
ARHOLIAD Examination

Unseen examination

GWAITH CWRS Reflect and Relate

A written report reflecting on the practical work completed, its worth to the field and the student.

GWAITH CWRS Red/Blue Team Exercise

A report on a security exercise on a given system, from either the red or blue team approach. Students may experiment in groups, but the final report must be individual.


Strategaeth addysgu a dysgu


24 hours over 12 weeks including lab preparation


24 hours over 12 weeks

Private study 52

Sgiliau Trosglwyddadwy

  • Llythrennedd - Medrusrwydd mewn darllen ac ysgrifennu drwy amrywiaeth o gyfryngau
  • Rhifedd - Medrusrwydd wrth ddefnyddio rhifau ar lefelau priodol o gywirdeb
  • Defnyddio cyfrifiaduron - Medrusrwydd wrth ddefnyddio ystod o feddalwedd cyfrifiadurol
  • Adalw gwybodaeth - Gallu mynd at wahanol ac amrywiol ffynonellau gwybodaeth
  • Dadansoddi Beirniadol & Datrys Problem - Gallu dadelfennu a dadansoddi problemau neu sefyllfaoedd cymhleth. Gallu canfod atebion i broblemau drwy ddadansoddiadau ac archwilio posibiliadau
  • Cyflwyniad - Gallu cyflwyno gwybodaeth ac esboniadau yn glir i gynulleidfa. Trwy gyfryngau ysgrifenedig neu ar lafar yn glir a hyderus.
  • Gwaith Tîm - Gallu cydweithio'n adeiladol ag eraill ar dasg gyffredin, ac/neu fod yn rhan o dîm gweithio o ddydd i ddydd
  • Dadl - Gallu cyflwyno, trafod a chyfiawnhau barn neu lwybr gweithredu, naill ai gydag unigolyn neu mewn grwˆp ehangach

Sgiliau pwnc penodol

  • Knowledge and understanding of facts, concepts, principles & theories
  • Use of such knowledge in modelling and design
  • Problem solving strategies
  • Analyse if/how a system meets current and future requirements
  • Deploy theory in design, implementation and evaluation of systems
  • Recognise legal, social, ethical & professional issues
  • Knowledge of information security issues
  • Specify, design or construct computer-based systems
  • Deploy tools effectively
  • Methods, techniques and tools for information modelling, management and security
  • Knowledge of systems architecture
  • Defining problems, managing design process and evaluating outcomes
  • System Design
  • Knowledge and/or understanding of appropriate scientific and engineering principles
  • Knowledge and understanding of mathematical principles
  • Specify, deploy, verify and maintain computer-based systems
  • Principles of appropriate supporting engineering and scientific disciplines


Cyrsiau sy’n cynnwys y modiwl hwn