You are on page 1of 9

Computer Systems Security

CT013-3-5-3

Module Introduction & Overview

Prepared by: HGB First Prepared on: 07-12-08

Prerequisites for this module

Hardware, Software Systems and Networks


or equivalent.

CT013-3-5-3 Computer Systems Security

Module Introduction

The objective of this module is to:

Contribute to the achievement of the Learning Outcomes specified

for the students award at Level 3


Enable students to further develop their knowledge and skills in
relation to Computer Systems Security
Develop the ability of students to critically apply the knowledge they
gain in relation to the study of Computer Systems Security
Further develop lifelong learning skills of independent learning and
study in relation to Computer Systems Security
Enable students to develop their ability to:
Critically Analyze
Innovate and create new approaches to complex problems, situations and
opportunities
Use quantitative skills and draw appropriate conclusions
Use and innovate ICT relevant to given situations

CT013-3-5-3 Computer Systems Security

Module Introduction

Learning outcome
1. Explain the principles and concepts involved
in the securing of computer systems both
stand-alone and networks based.
2. Specify, design and justify the design and
implementation decisions of an exemplar
component of a security system.3
3. Critically evaluate various techniques used
in exemplar security systems.

CT013-3-5-3 Computer Systems Security

Module Introduction

Topics we will cover

Types of threat
Protection and detection mechanism
Principle of encryption and decryption
Authentication protocols
Operating system security
Database security
Network security
Malicious software
Security models
Securing e-Business
Security policies and planning issues
Human factors in security

CT013-3-5-3 Computer Systems Security

Module Introduction

What support is available for


you
Consultation hours
Email
hoorang@apiit.edu.my

Resources
- Essential and additional reading material
- World wide web references

CT013-3-5-3 Computer Systems Security

Module Introduction

How you will be assessed


A Group In-course weighted at 50%, with
30% of the total contributed by an
individual component
An Exam weighted at 50%

CT013-3-5-3 Computer Systems Security

Module Introduction

Text and reference books


Essential Reading
William Stallings, Cryptography and Network Security, 4th edition (ISBN:
9780131873162)
Pfleeger, C.P., S. L. Pfleeger, Security in Computing, Prentice Hall, 3rd
edition, 2002, (ISBN:01303554488)
Anderson, R, Security Engineering: A Guide to Building Dependable
Distrbuted Systems, Wiley, 2001, (ISBN: 0471389226)
Bishop, M, Computer Security: Art and Science, Addison Wesley, 2002,
(ISBN: 0201440997)
Further Reading
Stajano, F, Security for Ubiquitous Computing, Wiley, 2002, (ISBN:
0470844930)
Pieprzyk, J., T. Hardjono, J. Seberry, J. Pierprzyk, Fundamentals of
Computer Security, Springer-Verlag, 2002, (ISBN: 3540431012)

CT013-3-5-3 Computer Systems Security

Module Introduction

Question and Answer session

Q&A
CT013-3-5-3 Computer Systems Security

Module Introduction

You might also like