CSCU9YS - Computer Security and Forensics
Dr David Cairns, Room 4B87, email@example.com (Module Co-ordinator)
10 credits at SCQF level 10
At the end of the course, the student should know and understand the principles of computer security and their application to forensic analysis. They should be able to demonstrate the ability to apply related theory and techniques to unseen problems without reference to notes, to work independently and under a time constraint. In particular, they should have developed an understanding of the following concepts:
In order to complete the module, you should be able to demonstrate the ability to apply related theory and techniques to unseen problems without reference to notes, to work independently and under a time constraint.
- The module will develop skills in problem solving and systems analysis.
- Privacy, Anonymity & Cryptography
- Identification and Authentication
- Access Control
- Networked Computer Security
- Secure Protocols
- Viruses, Trojans and Worms
- Computer Forensics
- Types of Intrusion
- Evidence Recovery
- Assignment (40%)
- Examination (60%)
In assessing a student's grade for the module, the Examiners require that a student must:
- Submit all items of assessed work.
Non-submission of any single item of assessed coursework will result in the award of No Grade for the module as a whole. Assessed coursework submitted late will be accepted up to seven days after the submission date (or expiry of any agreed extension) but the mark will be lowered by 3 points per day or part thereof. After seven days the assignment will be deemed a non-submission, and will result in the award of No Grade for the module as a whole. This rule may be relaxed for students who can show good cause for failure to submit. 'Good cause' may include illness (for which a medical certificate or other evidence will be required).
- Attend the examination. If a student is unable to attend the Main examination, he/she must apply to the Student Programmes Office for a Deferred examination. If a Deferred examination is not granted, then the Examiners may allow a Repeat examination. The mark awarded following a Repeat examination is capped at 40.
In addition, Regulation 14 of the University's First Degree Regulations sets out attendance rules for classes that have been defined by the Department as Prescribed. In this module, the Prescribed classes are the tutorials and practicals. Failure to attend at least two-thirds of prescribed classes will result in the module mark being capped at a maximum of 40, unless good cause for missing those classes can be shown. Responsibility for showing good cause lies with the student.
- Security in Computing (4th Edition), Charles P. Pfleeger and Shari Lawrence Pfleeger, Prentice Hall, 2006, ISBN 978-013-239077-9. [Required]
- Incident Response and Computer Forensics (2nd Edition), Kevin Mandia, Chris Prosise and Matt Pepe, Osborne McGraw Hill, 2003, ISBN 007-222696. [Background]
- Secrets and Lies: Digital Security in a Networked World, Bruce Schneier, John Wiley & Sons, 2004, ISBN 978-0471453802. [Background]
- Real Digital Forensics: Computer Security and Incident Response, Keith J. Jones, Richard Bejtlich and Curtis W. Rose, Addison Wesley, 2005, ISBN 978-0321240699. [Background]
- The Cuckoo's Egg, Cliff Stoll, Pocket Books, 1990, ISBN 978-1-4165-0778-9. [Background]
Further information and teaching materials for this module.