Module Details

The information contained in this module specification was correct at the time of publication but may be subject to change, either during the session because of unforeseen circumstances, or following review of the module at the end of the session. Queries about the module should be directed to the member of staff with responsibility for the module.
Title PRIVACY AND SECURITY
Code COMP522
Coordinator Dr A Lisitsa
Computer Science
A.Lisitsa@liverpool.ac.uk
Year CATS Level Semester CATS Value
Session 2016-17 Level 7 FHEQ First Semester 15

Aims

The aims of this module are:

  • to introduce students to the major problems and solution approaches in the area of computer and Internet privacy, confidentiality and security.
  • to provide a theoretical framework for subsequent research in these challenging areas.


Learning Outcomes

At the end of the module, students should understand the main problems in security, confidentiality and privacy in conputers and in networks, and the reasons for their importance.


At the end of the module, students should understand the main approaches adopted for their solution and/or mitigation, together with the strengths and weaknesses of each of these approaches

At the end of the module, students should understand the main encryption algorithms and protocols 

At the end of the module, students should appreciate the application of encryption algorithms to secure messaging, key distribution and exchange, authentication and electronic payment systems

At the end of the module, students should understand the use of epistemic logics for formal modeling of security and privacy protocols.

At the end of the module, students should understand the legal and ethical issues related to securit, confidentiality and privacy.


Syllabus

1

Identification and authentication:

  • passwords v. tokens v. biometrics
  • identity v. capability
  • data aggregation, anonymity and pseudoanonymity; and
  • steganography.
2

Monitoring:

  • audit, and intrusion detection;
  • techniques (statistics, pattern recognition, etc);and
  • issues such as accountability v. privacy.
3

Protocols:

  • protocol design;
  • cryptography for secrecy, for signing, etc.;
  • symmetric key and asymmetric key protocols;
  • 3DEA and RSA protocols;
  • logical representation of protocols,
  • formal properties of protocols; and
  • applications, e.g. encryption, key distribution, identification, authentication, electronic cash, gambling etc.
4

Attacks and defences:

  • covert channels;
  • smart cards;
  • E-warfare:, e.g. viruses and worms, logic bombs, EMP guns, Trojan horses, denial/manipulation of service,etc.; and
  • firewalls and sandboxes, ethical hacking for penetration testing.
5

Legal and ethical issues: national anti-terrorism legislation, the USA clipper chip. Include a reference to legal and ethical issues (UK data protection act, European data protection and privacy legislation) covered in the research methods module COMP516.

6

Future directions:

  • ubiquitous/pervasive computing/nanotech security issues; and
  • quantum protocols and cryptography.

Teaching and Learning Strategies

Lecture - Lectures

Practical - Computer labs


Teaching Schedule

  Lectures Seminars Tutorials Lab Practicals Fieldwork Placement Other TOTAL
Study Hours 30
Lectures
        10
Computer labs
40
Timetable (if known)              
Private Study 110
TOTAL HOURS 150

Assessment

EXAM Duration Timing
(Semester)
% of
final
mark
Resit/resubmission
opportunity
Penalty for late
submission
Notes
Unseen Written Exam  150  Semester 1  75  Yes  Standard UoL penalty applies  Final Exam Notes (applying to all assessments) Two assessment tasks This work is not marked anonymously. Written examination  
CONTINUOUS Duration Timing
(Semester)
% of
final
mark
Resit/resubmission
opportunity
Penalty for late
submission
Notes
Coursework  36 hours for all CAs  Semester 1  12.5  Yes  Standard UoL penalty applies  Assignments 1 and 2  
Coursework  36 hours for all CAs  Semester 1  12.5  Yes  Standard UoL penalty applies  Assessment 2 

Recommended Texts

Reading lists are managed at readinglists.liverpool.ac.uk. Click here to access the reading lists for this module.
Explanation of Reading List: