Module overview
Aims and Objectives
Learning Outcomes
Knowledge and Understanding
Having successfully completed this module, you will be able to demonstrate knowledge and understanding of:
- Approaches to making systems and networks more robust to attack
- The Internet architecture and the layered TCP/IP networking model
- Network services, design, operation and security
- Principles of networking protocols
- Issues surrounding privacy and anonymity
- The importance of taking a multi-disciplinary approach to cyber security
- The cyber threat landscape, including actors
Subject Specific Intellectual and Research Skills
Having successfully completed this module you will be able to:
- Design and analyse simple networks and the protocols they use
- Explain the fundamental concepts underlying computer networks
- Critically analyse a cyber attack and identify effective countermeasures
- Assess network systems and technologies
Syllabus
Internet architecture
- The TCP/IP layered model
- Protocols, design principles, standardisation, IETF
- Naming and addressing
Link-layer
- Transmission theory and protocols
- Ethernet networks, switches
- Wireless networks
Network layer
- Routing, link state and distance vector algorithms
- Subnet, site and ISP routing perspectives
- IPv6
Network services
- Quality of service (QoS)
- IP multicast, reliable multicast
- Host configuration, service discovery, zero-configuration networking
- DHCP, DNS
Transport layer
- TCP, UDP
Network design and operation
- Infrastructures; enterprise/campus, ISP/home networks
- Network monitoring and management
- Virtual network environments
Applications
- Web/HTTP, Email/SMTP
Fundamental Security Concepts
- Cyber actors
- Cyber attacks, and the Kill Chain model of the cyber attack life cycle
Principles of Cryptography
- Public Key Infrastructure
- Secure communication
- User authentication
- Privacy and data anonymisation
Cyber Threat Landscape
- Corporate security
- Advanced Persistent Threats
- Social Engineering
- Cyberwarfare
- Hacktivism
- Security of Critical infrastructures
Learning and Teaching
Teaching and learning methods
The content of this module is delivered through lectures, the module website, directed reading and pre-recorded materials.
Students work on their understanding through a combination of independent study and preparation for timetabled activities, along with formative assessments in the form of coursework assignments.
Students work on their practical skills and technical understanding in technical laboratories and assessed laboratories.
Type | Hours |
---|---|
Wider reading or practice | 60 |
Lecture | 36 |
Completion of assessment task | 5 |
Specialist Laboratory | 10 |
Follow-up work | 18 |
Preparation for scheduled sessions | 5 |
Revision | 16 |
Total study time | 150 |
Resources & Reading list
Textbooks
D. Comer and D. Stevens (1993). Internetworking with TCP/IP Volume III: Client-Server Programming and Applications. Prentice Hall.
Andress, J. (2013). Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners. Syngress.
Clarke, R.A (2012). Cyber War: The Next Threat to National Security and What to Do about it. ECCO Press.
L. Parziale et al (2006). TCP/IP Tutorial and Technical Overview. IBM Redbooks.
A Tanenbaum, D. J. Wetherall (2010). Computer Networks. Pearson.
LL Peterson and BS Davie (2008). Computer Networks, a Systems Approach. Morgan Laufman.
Hadnagy, C. (2011). Social Engineering: The Art of Human Hacking. Wiley.
Graham, J., Howard, R. and Olson, R (2011). Cyber Security Essentials. CRC Press.
Assessment
Assessment strategy
This module is assessed by a combination of coursework, assessed laboratories and a final assessment in the form of a computer aided examination.
Summative
This is how we’ll formally assess what you have learned in this module.
Method | Percentage contribution |
---|---|
Laboratory Exercises | 20% |
Examination | 80% |