University of Surrey - Guildford
Registry
  
 

  
 
Registry > Module Catalogue
View Module List by A.O.U. and Level  Alphabetical Module Code List  Alphabetical Module Title List  Alphabetical Old Short Name List  View Menu 
2010/1 Module Catalogue
 Module Code: COMM028 Module Title: TECHNOLOGIES AND APPLICATIONS
Module Provider: Computing Short Name: COMM028
Level: M Module Co-ordinator: HO AT Prof (Computing)
Number of credits: 15 Number of ECTS credits: 7.5
 
Module Availability
Semester 2
Assessment Pattern
Assessment Pattern
Unit(s) of Assessment
Weighting Towards Module Mark( %)

Coursework (via projects)

 
         Project Report (Individual)
40%
         Project Poster Presentation (Group)
20%
Project Oral Presentation (Group)
20%
Lecture Weekly Summary (Individual)
20%
Qualifying Condition(s) 

A weighted aggregate mark of 50% is required to pass the module

Module Overview

The field of Information security has continued to grow rapidly in the past few years. Cyber-crime and terrorism activities have spurred on many new research fields and activities in information security, particularly for applications in the commerce, government and defence sectors. These have resulted in many innovative developments and solutions to address some of the problems and issues related to security for software and systems. Unfortunately new innovations and technologies have also brought along a new set of security concerns and problems, for example, such as security loopholes and attacks that are frequently associated with common operating systems, databases and networks.

                                                                    
This module will be presented by security experts from government and industry to provide the students with knowledge and their perspective on the latest innovation and technologies, as well as problems and concerns associated with information security systems. These lectures will include relevant topics such as security issues with business and government IT systems, developer concerns, information assurance and risk management, and information sharing.
Prerequisites/Co-requisites
Attendance of Lectures is compulsory and weekly sign-up will be registered.
Module Aims

This module will provide the students with a comprehensive insight into the latest technological solutions, applications, problems and concerns related to information security. It will consist of a series of lectures presented by security experts from government and industry. These lectures will include relevant topics such as security issues with business and government IT systems, system architecture, developer concerns, information assurance and risk management, and information sharing.

There will be coursework and assessment via group projects involved to provide the students some hands-on knowledge and experience from industrial experts on the latest technologies and applications, problems and concerns related to information and multimedia security.

Learning Outcomes

By the end of the module, students should be able to:

  • Contrast and evaluate the latest innovations and technologies in information security
  • Recognise the benefits, concerns and problems associated with computer and IT security systems
Describe and design relevant functions within a security platform/system based on topics covered by industrial experts
Module Content

The module content will include the following areas:

  • Business IT security and developer issues
  • Risk Management and information assurance practices
  • Security and concerns in information sharing
  • Security in system architecture
Methods of Teaching/Learning

30 contact hours in weeks 1-10, consisting of:

  • 20 hours of lecture and example classes (up to 9 industrial and government experts)
  • 10 hours of coursework working on a group project related to a selected security area from the expert lectures. The coursework will be assessed as follows:
    • Individual report (5000 words) of randomly selected theme from expert lectures with literature survey, in-depth interpretation and analysis (40%)
    • Group poster presentation (20%)  
    • Group oral presentation (20%)
    • Lecture Weekly Summary (20%)
For group poster and oral presentation, assessment will be performed by the module coordinator and industrial experts
Selected Texts/Journals
Essential Reading:
 
None
 
Recommended Reading:

Pfleeger, C. & Pfleeger, S. (2006), Security in Computing, fourth Edition, Prentice Hall, ISBN-13: 9780132390774

Notes and references from industrial experts  

Supplementary Reading:

Bishop, M. (2004), Introduction to Computer Security, Addison-Wesley, ISBN-13: 978-0321247445

Last Updated
September 2010