Cyber Security is a vital aspect of modern life, but it has been shown very hard to achieve in practice. This module looks at the fundamental theoretical concepts and principles that aim to achieve security. By understanding sound theory, you will be in a position to build systems that resist a broader range of attacks, and understand attack modes in a more principled way. Theoretical concepts covered will include: intermediate-level cryptography; security protocols and their analysis; authentication and authorisation; access control models; and information flow.
Learning Outcomes
By the end of the module students should be able to:
Demonstrate an understanding of theoretical concepts in computing security
Understand and apply sound principles of computer security
Apply cryptography to solve problems of confidentiality, integrity and authentication
Use access control models to solve problems of authorisation
The student should demonstrate the capacity to independently study, understand, and critically evaluate advanced materials or research articles in the subject areas covered by this module.