Course Information
COMP3355 Cyber Security

COMP3355 Cyber Security

2019-20
Instructor(s):Chow K P
(Class A) No. of credit(s):6
Recommended Learning Hours:
Lecture: 33.0
Tutorial: 6.0
Pre-requisite(s):COMP2119 or ELEC2543
Co-requisite(s):  
Mutually exclusive with:ELEC4641
Remarks:

Course Learning Outcomes

1. [Foundation]
Be able to understand the principles and objectives of information security, encryption, cyber-attacks and defense.
2. [Model]
Be able to understand security models and to apply the model to achieve the security objectives.
3. [Design]
Be able to understand the basic principles of security design and to apply the principles.
4. [Application]
Be able to understand the security issues of a real-life Internet applications.
5. [Application development]
Be able to implement a practical Internet application in a secure manner.
Mapping from Course Learning Outcomes to Programme Learning Outcomes
 PLO aPLO bPLO cPLO dPLO ePLO fPLO gPLO hPLO iPLO j
CLO 1TTT
CLO 2TTT
CLO 3TTTT
CLO 4TTTT
CLO 5TTTT

T - Teach, P - Practice
For BEng(CompSc) Programme Learning Outcomes, please refer to here.

Syllabus

Calendar Entry:
This course introduces the principles, mechanisms and implementation of cyber security and information protection. Knowledge about cyber-attacks and defense are included. Topics include notion and terms of cyber security; introduction to cryptography; symmetric key cryptography and public key cryptography; authentication techniques; access control methods; network and Internet security and protection (e.g. firewall and IDS); application and web security; analysis and models of secure systems; cyber threat assessment and penetration testing; mobile code security.

Detailed Description:

Computer and network security Mapped to CLOs
Introduction to cryptography1
Symmetric key cryptography and public key cryptography1
Authentication techniques2, 3
Access control methods2, 3
Network and Internet security and protection1
Application and web security4, 5
Analysis and models of secure systems2, 3
Cyber threat assessment and penetration testing4, 5
Mobile code security4, 5

Assessment:
Continuous Assessment: 50%
Written Examination: 50%

Teaching Plan

Please refer to the corresponding Moodle course.

Moodle Course(s)