CSC-44108 - Cryptography and Network Security - Theory and Applications
Coordinator: Aisha Junejo Room: CR122
Lecture Time: See Timetable...
Level: Level 7
Credits: 30
Study Hours: 300
School Office: 01782 733075

Programme/Approved Electives for 2025/26

None

Available as a Free Standing Elective

No

Co-requisites

None

Prerequisites

None

Barred Combinations

None

Description for 2025/26

Linked with current industry certification requirements e.g. ISC2, this module will build your proficiency in the theory and application of cryptography and network security. After an overview of the Cyber Threat Landscape and Basic Cyber Hygiene practices, you will master Symmetric and Asymmetric Cryptography, Cryptographic Protocols, and Key Management. You will also learn about Networks, Protocols and Architectures, and the role of Firewalls and Intrusion Detection Systems. You will then explore Malware and Attack Technologies and effective Incident Response techniques.

Aims
This module aims to enable students to:
• understand the diverse types of cryptography and computer networks
• understand principles and practices in communications and computer network technologies and deployments
• comprehend fundamental security goals achieved through cryptographic algorithms and protocols
• apply network security approaches
• identify major attack techniques and characteristics against cryptography and networks, and countermeasures
• outline emerging trends in cryptographic and network security applications, attacks, and defence approaches (including identifying properties that cryptographic algorithms can have to resist attacks, and for networks to be resilient from attacks)
• identify, apply, analyse, and appraise different cryptographic solutions and network security approaches in the light of evolving security risks and state-of-the-art countermeasures
• develop teamwork, critical analysis, and academic writing and communication skills

Intended Learning Outcomes

Explain and differentiate basic terminologies and fundamental concepts in cryptography and network security: 1
Assess cryptographic algorithms and protocols to verify that they meet identified security criteria for effective resilience to attacks: 1,2
Apply fundamental and widely researched cryptanalysis techniques to specific cipher types: 1,2
Describe the theory and principles of technologies employed to enable data communications in modern computer networks: 1,2,3
Create computer networks using real or virtualised approaches, recognising their limitations: 1,2
Use applicable approaches to analyse and assess computing networks for threats, vulnerabilities, and potential impacts on network security incident scenarios in various application areas and sectors: 1,2,3
Develop appropriate security controls and countermeasure configurations using appropriate tools and techniques for mitigating network security risks: 2
Analyse write-ups on cryptography, network security management, and policy applications, and synthesise knowledge into summary insights: 1

Study hours

Lectures: 36 hours [6 hours each per week]
Practicals/Tutorials: 36 hours [6 hours each per week]
Private Study: 102 hours
Assessment Preparation: 126 hours (76 hours group work and 50 hours individual preparation)

School Rules

None

Description of Module Assessment

1: Portfolio weighted 30%
Individual Weekly Assignments Tasks
The assessment involves completing 6 weekly individual tasks and submitting a short report (1500 words maximum in total) covering the learning from each week to build a portfolio of work.

2: Group Assessment weighted 60%
Group-based Project & Presentation
The assessment involves students working in small groups of 4 to complete applied, scenario-based projects involving security analysis and the development of network security solutions. Each group will make a 30-minute, group-based presentation to describe and demonstrate the work done, lessons learned, and implication to practice (plus 15-minutes for Q and A), supported by a single team report (4000 words equivalent) that will outline the collective effort from the group and an indication of contribution levels. Students will be given a team mark. Individual marks will then be calculated based on the contribution levels outlined in the report. This will ensure the final marks reflects contribution levels.

3: Reflective Diary weighted 10%
Individual reflection
This assessment involves each student producing an individual report (1,000 word equiv.) explaining and reflecting on their role in the group project, their individual contribution and how they went about it, demonstrating their individual understanding of a range of topics covered in the module delivery.