Module overview
Aims and Objectives
Learning Outcomes
Subject Specific Intellectual and Research Skills
Having successfully completed this module you will be able to:
- Design and analyse simple networks and the protocols they use
- Critically analyse a cyber attack and identify effective countermeasures
- Explain the fundamental concepts underlying computer networks
- Assess network systems and technologies
Knowledge and Understanding
Having successfully completed this module, you will be able to demonstrate knowledge and understanding of:
- Issues surrounding privacy and anonymity
- Approaches to making systems and networks more robust to attack
- The cyber threat landscape, including actors
- The Internet architecture and the layered TCP/IP networking model
- Principles of networking protocols
- The importance of taking a multi-disciplinary approach to cyber security
- Network services, design, operation and security
Syllabus
Internet architecture
- The TCP/IP layered model
- Protocols, design principles, standardisation, IETF
- Naming and addressing
Link-layer
- Transmission theory and protocols
- Ethernet networks, switches
- Wireless networks
Network layer
- Routing, link state and distance vector algorithms
- Subnet, site and ISP routing perspectives
- IPv6
Network services
- Quality of service (QoS)
- IP multicast, reliable multicast
- Host configuration, service discovery, zero-configuration networking
- DHCP, DNS
Transport layer
- TCP, UDP
Network design and operation
- Infrastructures; enterprise/campus, ISP/home networks
- Network monitoring and management
- Virtual network environments
Applications
- Web/HTTP, Email/SMTP
Fundamental Security Concepts
- Cyber actors
- Cyber attacks, and the Kill Chain model of the cyber attack life cycle
Principles of Cryptography
- Public Key Infrastructure
- Secure communication
- User authentication
- Privacy and data anonymisation
Cyber Threat Landscape
- Corporate security
- Advanced Persistent Threats
- Social Engineering
- Cyberwarfare
- Hacktivism
- Security of Critical infrastructures
Learning and Teaching
Teaching and learning methods
The content of this module is delivered through lectures, the module website, directed reading and pre-recorded materials.
Students work on their understanding through a combination of independent study and preparation for timetabled activities, along with formative assessments in the form of coursework assignments.
Students work on their practical skills and technical understanding in technical laboratories and assessed laboratories.
Type | Hours |
---|---|
Specialist Laboratory | 10 |
Follow-up work | 18 |
Wider reading or practice | 60 |
Lecture | 36 |
Revision | 16 |
Completion of assessment task | 5 |
Preparation for scheduled sessions | 5 |
Total study time | 150 |
Resources & Reading list
Textbooks
LL Peterson and BS Davie (2008). Computer Networks, a Systems Approach. Morgan Laufman.
A Tanenbaum, D. J. Wetherall (2010). Computer Networks. Pearson.
D. Comer and D. Stevens (1993). Internetworking with TCP/IP Volume III: Client-Server Programming and Applications. Prentice Hall.
Clarke, R.A (2012). Cyber War: The Next Threat to National Security and What to Do about it. ECCO Press.
Graham, J., Howard, R. and Olson, R (2011). Cyber Security Essentials. CRC Press.
Andress, J. (2013). Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners. Syngress.
L. Parziale et al (2006). TCP/IP Tutorial and Technical Overview. IBM Redbooks.
Hadnagy, C. (2011). Social Engineering: The Art of Human Hacking. Wiley.
Assessment
Assessment strategy
This module is assessed by a combination of coursework, assessed laboratories and a final assessment in the form of a computer aided examination.
Summative
This is how we’ll formally assess what you have learned in this module.
Method | Percentage contribution |
---|---|
Examination | 80% |
Laboratory Exercises | 20% |