COMPUTING SCIENCE
AND MATHEMATICS

University | Computing Science | Modules | CSCU9YS | Syllabus Updated 1/09/15 10:10
CSCU9YS - Computer Security & Forensics Syllabus Autumn 2015

Home

Organisation

Materials

Assessment

Reference

 

 

Lecturer
Dr David Cairns, Room 4B87, dec@cs.stir.ac.uk (Module Co-ordinator)

Prerequisites
CSCU9P5, CSCU9W6

Credits
10 credits at SCQF level 10

Learning Outcomes
At the end of the course, the student should know and understand the principles of computer security and their application to forensic analysis. They should be able to demonstrate the ability to apply related theory and techniques to unseen problems without reference to notes, to work independently and under a time constraint. In particular, they should have developed an understanding of the following concepts:
  • Confidentiality
  • Integrity
  • Availability
  • Forensics
In order to complete the module, you should be able to demonstrate the ability to apply related theory and techniques to unseen problems without reference to notes, to work independently and under a time constraint.

Transferable Skills
  • The module will develop skills in problem solving and systems analysis.
Content
  • Privacy, Anonymity & Cryptography
  • Identification and Authentication
  • Access Control
  • Networked Computer Security
    • Secure Protocols
    • Viruses, Trojans and Worms
  • Computer Forensics
    • Types of Intrusion
    • Evidence Recovery
    • Analysis
Assessment

Repeat Assessment

Students who fulfil the module requirements, but obtain an overall fail mark (0-39) are eligible for repeat assessment. In most cases, this will be a repeat class test. Repeats are not permitted for laboratory checkpoints or group work. The mark following any repeat assessment is capped at 40.

Discretionary Repeat Assessment

In exceptional circumstances, a student who has not met all the module requirements, following the Main examination period, may be permitted a discretionary repeat. This may be a repeat class test. Repeats are not permitted for laboratory checkpoints or group work. The mark following any repeat assessment is capped at 40. If you are granted a discretionary repeat assessment but do not attempt it, you will be awarded grade X for the module.

In deciding whether to grant a discretionary repeat, the Examiners will consider your record of attendance and engagement in the module. Students with a poor attendance record will not normally be permitted a discretionary repeat.

Compulsory Assessments
  • Assignment (40%)
  • Examination (60%)
Textbooks
  • Security in Computing (4th Edition), Charles P. Pfleeger and Shari Lawrence Pfleeger, Prentice Hall, 2006, ISBN 978-013-239077-9. [Required]
  • Incident Response and Computer Forensics (2nd Edition), Kevin Mandia, Chris Prosise and Matt Pepe, Osborne McGraw Hill, 2003, ISBN 007-222696. [Background]
  • Secrets and Lies: Digital Security in a Networked World, Bruce Schneier, John Wiley & Sons, 2004, ISBN 978-0471453802. [Background]
  • Real Digital Forensics: Computer Security and Incident Response, Keith J. Jones, Richard Bejtlich and Curtis W. Rose, Addison Wesley, 2005, ISBN 978-0321240699. [Background]
  • The Cuckoo's Egg, Cliff Stoll, Pocket Books, 1990, ISBN 978-1-4165-0778-9. [Background]

 

Email dec@cs.stir.ac.uk - Web www.cs.stir.ac.uk/~dec - Tel 01786 467445 - Fax 01786 464551
Mail Computing Science and Mathematics, University of Stirling, Stirling, Scotland, FK9 4LA
Contact Details