Subject details

  • Topics
    • Introduction
    • Security mechanisms, attack methods
    • Elementary cryptography
    • Authentication
    • Access control
    • Operating system security
    • Database security
    • Network security
    • Web security
    • Mobile computing
    • Privacy
    • Internet banking
  • Study resources
    • Instructional Methods
      • Audio/Video conferencing
      • Chat Rooms
      • Disscusion forum/Discussion Board
      • Embedded Multimedia
      • Online Quizzes/Tests
      • Online assignment submission
      • Podcasting/Leacture capture
      • Standard Media
      • Streaming Multimedia
      • Web links
    • Online Materials
      • Resources and Links
      • Printable format materials
      • Simulations
      • Quizzes
      • Audio-Video streaming
      • Online Assessment

Upon successful completion of the subject students will be able to:

  1. explain the functioning of security services in computing environments and the security issues in mobile computing
  2. discuss the types and attack strategies of malware
  3. describe basic system security mechanisms, such as those used in operating systems, file systems and computer networks
  4. analyse the overarching importance of IT security in areas such as networking, databases, operating systems, and web systems
  5. apply privacy principles in basic practical settings in IT environments
  6. analyse and evaluate the security of computing and IT systems on a practical level and privacy related issues in computing.
  • Assignment 1 - Final Written Exam (50%)
  • Assignment 2 - Assignment 2 (25%)
  • Assignment 3 - Assignment 1 (10%)
  • Assignment 4 - Online Test(s) (15%)

Textbooks are subject to change within the academic year. Students are advised to purchase their books no earlier than one to two months before the start of a subject

Recommended

  • Computer Security, 3rd Ed.
  • D. Gollman
  • 978047074115
  • Print

Entry Requirements

You are recommended to have completed the following subjects(s) or have equivalent knowledge before starting this unit:

Special requirements

No special requirements

Security has become a focal area in IT; it has grown and evolved significantly in recent years and different areas of specialisation have emerged.
 
This subject gives an introduction to technical aspects of security for future IT professionals, and presents the foundations. It looks at the different security mechanisms used in various areas of computing, including operating systems, databases and web-based applications.
 
For computer systems that are used and relied upon in many areas of life, security has become an important aspect; availability and correct operation are essential. IT professionals working in the field need to be well acquainted with the security features of the tools and applications they use and produce. Protection of data regardless of the information they contain is a critical task, and requires expertise.

Related degrees