Dr David Cairns, Room 4B87, firstname.lastname@example.org (Module Co-ordinator)
11 credits at SCQF level 10
At the end of the course, the student should know and understand the principles of
computer security and their application to forensic analysis. They should be able to demonstrate
the ability to apply related theory and techniques to unseen problems
without reference to notes, to work independently and under a time
constraint. In particular, they should
have developed an understanding of the following concepts:
In order to complete the module, you should be able to demonstrate the
ability to apply related theory and techniques to unseen problems without
reference to notes, to work independently and under a time constraint.
- The module will develop skills in problem solving and systems analysis.
- Privacy, Anonymity & Cryptography
- Identification and Authentication
- Access Control
- Networked Computer Security
- Secure Protocols
- Viruses, Trojans and Worms
- Computer Forensics
- Types of Intrusion
- Evidence Recovery
- Assignment (40%)
- Examination (60%)
In assessing a student's grade for the module, the Examiners require that a student must:
In addition, Regulation 14 of the University's First Degree Regulations sets out attendance rules for classes
that have been defined by the Department as Prescribed. In this module, the Prescribed classes are the
tutorials and practicals. Failure to attend at least two-thirds of
prescribed classes will result in the module grade being capped at a
maximum of 3C, unless good cause for missing those classes can be shown.
Responsibility for showing good cause lies with the student.
- Submit all items of assessed work.
Non-submission of any single item of assessed coursework will result in the award of No Grade for
the module as a whole. Assessed coursework submitted late will be accepted up to five days after the
submission date (or expiry of any agreed extension) but the grade will be lowered by one grade point
per day or part thereof. After five days the piece of work will be deemed a non-submission, and will
result in the award of No Grade for the module as a whole. This rule may be relaxed for students
who can show good cause for failure to submit. 'Good cause' may include illness (for which a
medical certificate or other evidence will be required).
- Attend the examination.
If a student is unable to attend the Main examination, he/she must apply to the Student Programmes
Office for a Deferred examination. If a Deferred examination is not granted, then the Examiners
may allow a Repeat examination. The grade awarded following a Repeat examination is capped at 3C.
- Security in Computing (4th Edition), Charles P. Pfleeger and Shari Lawrence Pfleeger, Prentice Hall, 2006, ISBN 978-013-239077-9. [Required]
- Incident Response and Computer Forensics (2nd Edition), Kevin Mandia, Chris Prosise and Matt Pepe, Osborne McGraw Hill, 2003, ISBN 007-222696. [Background]
- Secrets and Lies: Digital Security in a Networked World, Bruce Schneier, John Wiley & Sons, 2004, ISBN 978-0471453802. [Background]
- Real Digital Forensics: Computer Security and Incident Response, Keith J. Jones, Richard Bejtlich and Curtis W. Rose, Addison Wesley, 2005, ISBN 978-0321240699. [Background]
- The Cuckoo's Egg, Cliff Stoll, Pocket Books, 1990, ISBN 978-1-4165-0778-9. [Background]