Course Code:CSC109S2
Course Title:Introduction to Computer Security and Cryptography
Credit Value:02
Core/Optional:core
Hourly Breakdown:TheoryPracticalIndependent Learning
3070
Objectives:Introduce Computer security principles and cryptography, and analyse the need of Public key infrastructure and its applications
Intended Learning Outcomes:
  • Describe the concepts of computer security and cryptography
  • Explain notions of threat, vulnerability, and attacks
  • Utilise different symmetric key and public key encryption algorithms
  • Discuss the importance of Public-key Infrastructure and its applications
Contents:
  • Foundations of computer security: introduction to computer security and cryptography
  • Concepts of risks, threats, vulnerabilities and types of attacks: computer security attacks, types, attacker goals, motivations (such as underground economy, digital espionage, cyberwarfare, insider threats, hacktivism, advanced persistent threats), examples of malware, organizational vulnerabilities and threats
  • Key security properties: confidentiality, integrity and availability
  • Concepts of authentication, authorization and access control: OSI security architecture, security services and security mechanisms
  • Classical encryption techniques: Symmetric key ciphers, substitution techniques, transposition techniques, other classical encryption tools, key management techniques
  • Public-key cryptography and its applications: introduction to PKI, hash functions, digital signatures and digital certificates, secure web browsing, e-commerce, secure authentication
Teaching/Learning Methods:Lectures, Class discussion, Recitation oral questions, Lecture demonstration, Small group discussions, Use of slides, Textbook assignments.
Assessment Strategy:
  • In-course Assessments —————————————30%
  • End-of-course Examination ———————————-70%
References:
  • W. Stallings, Cryptography and Network Security: Principles and Practice, 6th Ed., 2013.
  • J. Katz and Y. Lindell. Introduction to Modern Cryptography, 2nd Ed., 2014.