Module Specification

The information contained in this module specification was correct at the time of publication but may be subject to change, either during the session because of unforeseen circumstances, or following review of the module at the end of the session. Queries about the module should be directed to the member of staff with responsibility for the module.
1. Module Title Privacy and Security
2. Module Code COMP522
3. Year Session 2023-24
4. Originating Department Computer Science
5. Faculty Fac of Science & Engineering
6. Semester First Semester
7. CATS Level Level 7 FHEQ
8. CATS Value 15
9. Member of staff with responsibility for the module
Dr A Lisitsa Computer Science A.Lisitsa@liverpool.ac.uk
10. Module Moderator
11. Other Contributing Departments  
12. Other Staff Teaching on this Module
Mrs J Birtall School of Electrical Engineering, Electronics and Computer Science Judith.Birtall@liverpool.ac.uk
13. Board of Studies
14. Mode of Delivery
15. Location Main Liverpool City Campus
    Lectures Seminars Tutorials Lab Practicals Fieldwork Placement Other TOTAL
16. Study Hours 30

        10

40
17.

Private Study

110
18.

TOTAL HOURS

150
 
    Lectures Seminars Tutorials Lab Practicals Fieldwork Placement Other
19. Timetable (if known)            
 
20. Pre-requisites before taking this module (other modules and/or general educational/academic requirements):

 
21. Modules for which this module is a pre-requisite:

 
22. Co-requisite modules:

 
23. Linked Modules:

 
24. Programme(s) (including Year of Study) to which this module is available on a mandatory basis:

25. Programme(s) (including Year of Study) to which this module is available on a required basis:

26. Programme(s) (including Year of Study) to which this module is available on an optional basis:

27. Aims
 

The aims of this module are: to introduce students to the major problems and solution approaches in the area of computer and Internet privacy, confidentiality and security. to provide a theoretical framework for subsequent research in these challenging areas.

 
28. Learning Outcomes
 

(LO1) At the end of the module, students should understand the main problems in security, confidentiality and privacy in conputers and in networks, and the reasons for their importance.

 

(LO2) At the end of the module, students should understand the main approaches adopted for their solution and/or mitigation, together with the strengths and weaknesses of each of these approaches

 

(LO3) At the end of the module, students should understand the main encryption algorithms and protocols

 

(LO4) At the end of the module, students should appreciate the application of encryption algorithms to secure messaging, key distribution and exchange, authentication and electronic payment systems

 

(LO5) At the end of the module, students should understand the use of epistemic logics for formal modeling of security and privacy protocols.

 

(LO6) At the end of the module, students should understand the legal and ethical issues related to securit, confidentiality and privacy.

 

(S1) Adaptability

 

(S2) Problem solving skills

 

(S3) Numeracy

 

(S4) IT skills

 

(S5) Commercial awareness

 

(S6) Ethical awareness

 

(S7) Lifelong learning skills

 
29. Teaching and Learning Strategies
 

Teaching Method 1 - Lecture
Description: Lectures
Teaching Method 2 - Practical
Description: Computer labs

Standard on-campus delivery
Teaching Method 1 - Lecture
Description: Mix of on-campus/on-line synchronous/asynchronous sessions
Teaching Method 2 - Tutorial/Practical
Description: On-campus synchronous sessions

 
30. Syllabus
   

Identification and authentication:
-passwords v. tokens v. biometrics
-identity v. capability
-data aggregation, anonymity and pseudoanonymity
-steganography.

Monitoring:
-audit, and intrusion detection
-techniques (statistics, pattern recognition, etc)
-issues such as accountability v. privacy.

Protocols:
-protocol design
-cryptography for secrecy, for signing, etc.
-symmetric key and asymmetric key protocols
-3DEA and RSA protocols
-logical representation of protocols
-formal properties of protocols
-applications, e.g. encryption, key distribution, identification, authentication, electronic cash, gambling etc.

Attacks and defences:
-covert channels
-smart cards
-E-warfare e.g. viruses and worms, logic bombs, EMP guns, Trojan horses, denial/manipulation of service, etc.
-firewalls and sandboxes, ethical hacking for penetration testing

Legal and ethical issues: national anti-terror ism legislation, the USA clipper chip. Include a reference to legal and ethical issues (UK data protection act, European data protection and privacy legislation) covered in the research methods module COMP516.

Future directions:
-ubiquitous/pervasive computing/nanotech security issues
-quantum protocols and cryptography.

 
31. Recommended Texts
  Reading lists are managed at readinglists.liverpool.ac.uk. Click here to access the reading lists for this module.
 

Assessment

32. EXAM Duration Timing
(Semester)
% of
final
mark
Resit/resubmission
opportunity
Penalty for late
submission
Notes
  (522) Final exam 150 60
33. CONTINUOUS Duration Timing
(Semester)
% of
final
mark
Resit/resubmission
opportunity
Penalty for late
submission
Notes
  (522.1) Assessment 1 There is a resit opportunity. Standard UoL penalty applies for late submission. This is not an anonymous assessment. Assessment Schedule (When) :Semester 1 0 20
  (522.2) Assignment 2 There is a resit opportunity. Standard UoL penalty applies for late submission. This is not an anonymous assessment. Assessment Schedule (When) :Semester 1 0 20