Courses Offered

COMP3355 Cyber Security

COMP3355 Cyber Security

2021-22
Instructor(s):Chow K P
(Class A) No. of credit(s):6
Recommended Learning Hours:
Lecture: 36.0
Tutorial: 3.0
Pre-requisite(s):COMP2119 or ELEC2543 or FITE2000
Co-requisite(s):  
Mutually exclusive with:ELEC4641
Remarks:

Course Learning Outcomes

1. [Foundation]
Be able to understand the principles and objectives of information security, encryption, cyber-attacks and defense.
2. [Model]
Be able to understand security models and to apply the model to achieve the security objectives.
3. [Design]
Be able to understand the basic principles of security design and to apply the principles.
4. [Application]
Be able to understand the security issues of a real-life Internet applications.
5. [Application development]
Be able to implement a practical Internet application in a secure manner.
Mapping from Course Learning Outcomes to Programme Learning Outcomes
 PLO aPLO bPLO cPLO dPLO ePLO fPLO gPLO hPLO iPLO j
CLO 1TTT
CLO 2TTT
CLO 3TTTT
CLO 4TTTT
CLO 5TTTT

T - Teach, P - Practice
For BEng(CompSc) Programme Learning Outcomes, please refer to here.

Syllabus

Calendar Entry:
This course introduces the principles, mechanisms and implementation of cyber security and information protection. Knowledge about cyber-attacks and defense are included. Topics include notion and terms of cyber security; introduction to cryptography; symmetric key cryptography and public key cryptography; authentication techniques; access control methods; network and Internet security and protection (e.g. firewall and IDS); application and web security; analysis and models of secure systems; cyber threat assessment and penetration testing; mobile code security.

Detailed Description:

Computer and network security Mapped to CLOs
Introduction to cryptography1
Symmetric key cryptography and public key cryptography1
Authentication techniques2, 3
Access control methods2, 3
Network and Internet security and protection1
Application and web security4, 5
Analysis and models of secure systems2, 3
Cyber threat assessment and penetration testing4, 5
Mobile code security4, 5

Assessment:
Continuous Assessment: 50%
Written Examination: 50%

Teaching Plan

Please refer to the corresponding Moodle course.

Moodle Course(s)

Don't have an account yet? Register Now!

Sign in to your account

Don't have an account yet? Register Now!

Sign in to your account