Skip to navigation | Skip to main content | Skip to footer

This is an archived syllabus from 2014-2015

COMP61421 Computer and Network Security syllabus 2014-2015

COMP61421 Computer and Network Security

Level 6
Credits: 15
Enrolled students: 73

Course leader: Ning Zhang

Additional staff: view all staff


  • Pre-Requisite (Compulsory): COMP61411

Assessment methods

  • 50% Written exam
  • 50% Coursework
Sem 1 P2 Lecture 2.19 Tue 09:00 - 17:00 -
Themes to which this unit belongs
  • Security


This course unit is jointly developed and delivered by Ning Zhang (from the School of Computer Science) and Daniel Dresner (a graduate of Manchester Business School who works with government, industry, and the third sector to secure information systems). Over the period of the module, Daniel and Ning are joined by a cohort of guest lecturers from industry.


The course unit covers risk and compensating security technologies by considering the requirements of cyber and information system security with a systemic view of the development process from the 'Acquisition' through to the 'Disposal' stages.


Information assurance: the need for computer and network security

  • Security Breaches 
    • Mistakes, criminality and cyber terrorism
  • System Life cycles
    • Plan-do-check-act
    • Propose, direct, monitor
  • Trust
  • Vulnerabilities
    • Windows
    • Unix
    • Open Source
    • Human vulnerabilities in computer and network security

Cyber and information security management

  • Risk management
    • Threats and breaches
    • Risk modelling
  • Technologies and countermeasures
    • Entity identification and authentication
    • Access control in computer systems and in networks
    • Communication security, Virtual Private Networks (VPNs) and Web security
    • Wireless network security
    • E-Commerce/cloud computing security

Controls and regulators

  • Protection 
    • Security Policy
    • Secure System Development and Maintenance
    • Security Organisation
    • Asset Management
    • Access Control
    • Physical and Environmental Security
    • Human factors
  • Operation
    • Communications and Operations Management
    • Security Incident and Event Management
    • Business Continuity Management
  • Self preservation
    • Intrusion prevention
    • Intrusion detection
  • Compliance
    • Cyber and information security management standards
    • Laws and regulations
    • Audits reviews, and inspection
    • Vulnerability scanners
    • Penetration testing
    • Computer forensics

Teaching methods


40 hours: Lectures and group work.

Feedback methods

Via question/answer session during lectures and course works.

Study hours

  • Assessment written exam (2 hours)
  • Lectures (20 hours)
  • Practical classes & workshops (15 hours)

Employability skills

  • Analytical skills
  • Group/team working
  • Innovation/creativity
  • Problem solving
  • Research
  • Written communication

Learning outcomes

Programme outcomeUnit learning outcomesAssessment
A1 A2 B2Have a good understanding of how to define system security requirements and a good understanding of a variety of generic security threats and vulnerabilities, and be able to identify and analyse particular security problems for a given network, combination of networks, or application.
  • Examination
  • Case Study Report
B2 C3 G4Be able to prioritise requirements, and match requirements to solutions and countermeasures commensurate with associated risks.
  • Examination
  • Case Study Report
A1Have a good understanding of the correlation of business processes to technology in relation to security requirements; particularly in the balancing of information and computing technologies with the human vulnerabilities in computing and information systems.
  • Examination
  • Case Study Report
C3Be familiar with the relevant industry security standards and the regulation, and their application.
  • Case Study Report
  • Examination
A1 A2Appreciate the application of security techniques and technologies in solving real-life security problems in practical systems.
  • Examination
  • Case Study Report

Reading list

Security engineering: a guide to building dependable distributed systems (2nd edition)Anderson, Ross J.9780470068526Wiley 2008
Cryptography and network security: principles and practice (7th edition)Stallings, William9781292158587Pearson2017
Building Internet firewalls (2nd edition)Zwicky, Elizabeth D. and Simon Cooper and D.Brent Chapman1565928717O' Reilly2000

Additional notes

Course unit materials

Links to course unit teaching materials can be found on the School of Computer Science website for current students.