Module Database Search



MODULE DESCRIPTOR
Module Title
Computer Security and Cryptography
Reference CM3705 Version 3
Created April 2019 SCQF Level SCQF 9
Approved June 2017 SCQF Points 30
Amended May 2019 ECTS Points 15

Aims of Module
To provide students with the knowledge and skills needed to understand the digital security landscape and the role of cryptography in securing computer-based information systems.

Learning Outcomes for Module
On completion of this module, students are expected to be able to:
1 Describe the information security requirements of commercial and public sector organisations and private individuals, and the threats posed to vulnerabilities in modern information systems.
2 Explain and analyse the role of cryptography in providing security services for modern computer systems.
3 Apply theory to examples of information infrastructures in the real-world context of an IT organisation and defend the reasoning behind these decisions with consideration to cost-benefit.
4 Evaluate potential outcomes of the implementation of an appropriate security technique to secure information stored as a relevant data type.

Indicative Module Content
Information Security: Digital threats, risks, forms of attack, categories and types of adversary, security needs, human factors. Information security governance and risk management. Security services: Confidentiality, Availability and Data Integrity. Authentication, Authorisation. Non-repudiation. Basic Cryptography. Symmetric Cryptography. Block ciphers and Stream ciphers. Modern block cipher design. Substitution and Transposition. Confusion and Diffusion. Feistel ciphers, Advanced Encryption Standard. Public Key Cryptography. Asymmetric cryptography algorithms, e.g. RSA, El Gamal, Elliptic Curve cryptography. Key Exchange protocols: e.g. Diffie-Hellman. Hash Functions and Digital Signatures. Authentication systems: symmetric and asymmetric protocols, certificates and public key infrastructures, business considerations.

Module Delivery
The module is delivered in Blended Learning mode using structured online learning materials/activities and directed study, facilitated by regular online tutor support. Workplace Mentor support and work-based learning activities will allow students to contextualise this learning to their own workplace. Face-to-face engagement occurs through annual induction sessions, employer work-site visits, and modular on-campus workshops.

Indicative Student Workload Full Time Part Time
Contact Hours 30 N/A
Non-Contact Hours 30 N/A
Placement/Work-Based Learning Experience [Notional] Hours 240 N/A
TOTAL 300 N/A
Actual Placement hours for professional, statutory or regulatory body 240  

ASSESSMENT PLAN
If a major/minor model is used and box is ticked, % weightings below are indicative only.
Component 1
Type: Coursework Weighting: 100% Outcomes Assessed: 1, 2, 3, 4
Description: Written coursework.

MODULE PERFORMANCE DESCRIPTOR
Explanatory Text
The calculation of the overall grade for this module is based on 100% weighting of C1. An overall minimum grade of D is required to pass the module.
Module Grade Minimum Requirements to achieve Module Grade:
A The student needs to achieve an A in C1
B The student needs to achieve a B in C1
C The student needs to achieve a C in C1
D The student needs to achieve a D in C1
E The student needs to achieve an E in C1
F The student needs to achieve an F in C1
NS Non-submission of work by published deadline or non-attendance for examination

Module Requirements
Prerequisites for Module Successful completion of Stage 2 or equivalent.
Corequisites for module None.
Precluded Modules None.

INDICATIVE BIBLIOGRAPHY
1 PFLEEGER, C., PFLEEGER, S.L., & MARGULIES, J., 2015. Security in Computing, 5th Ed., Prentice Hall.
2 STALLINGS, W. and BROWN, L., 2014. Computer Security: Principles and Practice, 3rd Ed., Pearson.
3 STALLINGS, W., 2016. Cryptography and Network Security: Principles and Practice, 7th Ed. Pearson.
4 FERGUSON, N., 2010. Cryptography Engineering: Design Principles and Practical Applications, Wiley.
5 MARTIN, K.M. 2012. Everyday Cryptography: Fundamental Principles and Applications, Oxford University Press.
6 BOSWORTH, S., KABAY, M., & WHYNE, E. (Eds) 2014. Computer Security Handbook, 6th Ed., Wiley.


Robert Gordon University, Garthdee House, Aberdeen, AB10 7QB, Scotland, UK: a Scottish charity, registration No. SC013781