WM242-24 Implementing Secure Systems
Introductory description
Secure systems have a singular goal - to concurrently enable things to happen that should happen, whilst preventing things from happening that should not happen. Within that simplicity are deep challenges: defining the contextually contingent sets of should and should not; anticipating what the future might bring; determining the extent of the system. Alongside these deep challenges however, there are well understood patterns of implementation that make the shoulds more likely and the should nots less likely. Similarly, there are well understood patterns that tend to encourage the opposite.
This module is concerned with deliberately choosing good patterns of implementation for the long-term well-being of the system under consideration.
Module aims
The aim of this module is to equip students with the knowledge and skills necessary to design, develop, and maintain secure systems. This includes understanding and applying best practices, employing core technologies, recognising security requirements and applying cryptographic techniques. The module also aims to enable students to construct comprehensive security systems and evaluate their effectiveness, providing recommendations for future improvements.
Outline syllabus
This is an indicative module outline only to give an indication of the sort of topics that may be covered. Actual sessions held may differ.
Outline content
The content of this module will be taught from a cyber security perspective.
- Design and development considerations
- Selecting and applying core technologies
- Recognising security needs on, across and between platforms
- Cryptography
- Network security
- Human factors
- Security systems development
Learning outcomes
By the end of the module, students should be able to:
- To explore various methodologies and identify best practices in the design and development of secure systems.
- To select security measures specific to different platforms and understand how to implement secure communication between these systems.
- To employ appropriate core technologies to enhance system security according to the specified security requirements.
- To understand the principles of cryptography and apply cryptographic techniques for secure data storage and transfer.
- To construct and implement comprehensive security systems choosing the most effective security measures based on the given system requirements.
- To evaluate the security of the system and provide recommendations for future improvements.
Indicative reading list
Bray, S.W. (2020) Implementing Cryptography Using Python. Wiley
Computer security. Third (2011). Wiley Textbooks
Cryptography and network security: principles and practice. Eighth (2021). Pearson
Ferguson, N., Schneier, B. and Kohno, T. (2015) Cryptography Engineering. Wiley
View reading list on Talis Aspire
Subject specific skills
Technology Application, Cryptography, System Security, Secure System Design , Secure Systems Development and evaluation
Transferable skills
Critical thinking, problem-solving, Technical report writing
Study time
Type | Required |
---|---|
Supervised practical classes | 45 sessions of 1 hour (19%) |
Private study | 99 hours (41%) |
Assessment | 96 hours (40%) |
Total | 240 hours |
Private study description
Independent activity between workshops, following up on activities initiated in previous workshops or preparing for upcoming workshops.
Costs
No further costs have been identified for this module.
You must pass all assessment components to pass the module.
Assessment group D
Weighting | Study time | Eligible for self-certification | |
---|---|---|---|
Assignment 1 | 60% | 56 hours | Yes (extension) |
Students are given a scenario and are required to design a cryptosystem, implement it and write a report to present the proposed system. Students will need to justify the selection of the methods used and submit a functioning program along with the relevant documentation. |
|||
Assignment 2 | 40% | 40 hours | No |
Students are given a system and are required to evaluate it in terms of the security characteristics and make recommendations for improvements in the effectiveness of the system. ~Platforms - WAS
|
Feedback on assessment
Written feedback for each assignment
Verbal feedback during tutorial sessions
Summative feedback on assignments
Courses
This module is Core for:
- Year 2 of UWMA-H651 Undergraduate Cyber Security