COMPUTING SCIENCE
AND MATHEMATICS

University | Computing Science | Modules | CSC9YS | Syllabus Updated 15/08/13 10:04
CSC9YS - Computer Security & Forensics Syllabus Autumn 2013

Home

Organisation

Materials

Assessment

Reference

 

 

Lecturer
Dr David Cairns, Room 4B87, dec@cs.stir.ac.uk (Module Co-ordinator)

Prerequisites
CSC9P5, CSC9W6

Credits
11 credits at SCQF level 10

Learning Outcomes
At the end of the course, the student should know and understand the principles of computer security and their application to forensic analysis. They should be able to demonstrate the ability to apply related theory and techniques to unseen problems without reference to notes, to work independently and under a time constraint. In particular, they should have developed an understanding of the following concepts:
  • Confidentiality
  • Integrity
  • Availability
  • Forensics
In order to complete the module, you should be able to demonstrate the ability to apply related theory and techniques to unseen problems without reference to notes, to work independently and under a time constraint.

Transferable Skills
  • The module will develop skills in problem solving and systems analysis.
Content
  • Privacy, Anonymity & Cryptography
  • Identification and Authentication
  • Access Control
  • Networked Computer Security
    • Secure Protocols
    • Viruses, Trojans and Worms
  • Computer Forensics
    • Types of Intrusion
    • Evidence Recovery
    • Analysis
Assessment
  • Assignment (40%)
  • Examination (60%)

In assessing a student's grade for the module, the Examiners require that a student must:

  • Submit all items of assessed work.
    Non-submission of any single item of assessed coursework will result in the award of No Grade for the module as a whole. Assessed coursework submitted late will be accepted up to five days after the submission date (or expiry of any agreed extension) but the grade will be lowered by one grade point per day or part thereof. After five days the piece of work will be deemed a non-submission, and will result in the award of No Grade for the module as a whole. This rule may be relaxed for students who can show good cause for failure to submit. 'Good cause' may include illness (for which a medical certificate or other evidence will be required).

  • Attend the examination.
    If a student is unable to attend the Main examination, he/she must apply to the Student Programmes Office for a Deferred examination. If a Deferred examination is not granted, then the Examiners may allow a Repeat examination. The grade awarded following a Repeat examination is capped at 3C.
In addition, Regulation 14 of the University's First Degree Regulations sets out attendance rules for classes that have been defined by the Department as Prescribed. In this module, the Prescribed classes are the tutorials and practicals. Failure to attend at least two-thirds of prescribed classes will result in the module grade being capped at a maximum of 3C, unless good cause for missing those classes can be shown. Responsibility for showing good cause lies with the student.

Textbooks
  • Security in Computing (4th Edition), Charles P. Pfleeger and Shari Lawrence Pfleeger, Prentice Hall, 2006, ISBN 978-013-239077-9. [Required]
  • Incident Response and Computer Forensics (2nd Edition), Kevin Mandia, Chris Prosise and Matt Pepe, Osborne McGraw Hill, 2003, ISBN 007-222696. [Background]
  • Secrets and Lies: Digital Security in a Networked World, Bruce Schneier, John Wiley & Sons, 2004, ISBN 978-0471453802. [Background]
  • Real Digital Forensics: Computer Security and Incident Response, Keith J. Jones, Richard Bejtlich and Curtis W. Rose, Addison Wesley, 2005, ISBN 978-0321240699. [Background]
  • The Cuckoo's Egg, Cliff Stoll, Pocket Books, 1990, ISBN 978-1-4165-0778-9. [Background]

 

Email dec@cs.stir.ac.uk - Web www.cs.stir.ac.uk/~dec - Tel 01786 467445 - Fax 01786 464551
Mail Computing Science and Mathematics, University of Stirling, Stirling, Scotland, FK9 4LA
Contact Details