Postgraduate Course: Research Methods in Security, Privacy, and Trust (INFR11188)
|School||School of Informatics
||College||College of Science and Engineering
|Credit level (Normal year taken)||SCQF Level 11 (Postgraduate)
||Availability||Not available to visiting students
|Summary||*This course is only available to students enrolled on the MSc in Security, Privacy and Trust*
To be a professional or researcher in the area, it is necessary to understand fundamental issues in connection with Cybersecurity, Privacy, and Trust.
This course aims to develop a deep understanding of current computer security and privacy research and will prepare students for conducting research in this area.
The course will focus on the main aspects of Cybersecurity, Privacy, and Trust, including topics like Cryptography, Software vulnerabilities, Web security, Access control, Mobile security, Differential privacy, Hardware protection, Side channel attacks, Block-chain, Network security, Usable security, and Passwords.
The goal of this course is to introduce students to fundamental security, privacy, and trust concepts and offer them working knowledge of threats and counter-measures in order for them to undertake research in these areas.
The topics to be covered in the course will include a sampling of the following:
Introduction: fundamental concepts: confidentiality, integrity, and availability, Threat modelling and Human Factors.
Security: OS security, secure (through cryptographic primitives) networking protocols, Malware, Network intrusion and DoS mitigation, integrity and authentication scheme.
Privacy: Privacy enhancing technologies: Anonymous communication systems, Censorship resistance systems, Database privacy, Regulation compliant data processing and storage.
Trust: Centralised and decentralised systems, Distributed trust, block chains and ledgers.
Entry Requirements (not applicable to Visiting Students)
||Other requirements|| Only available to students enrolled on the MSc in Security, Privacy, and Trust.
Some familiarity with computers and mathematics will be helpful.
Course Delivery Information
|Academic year 2019/20, Not available to visiting students (SS1)
|Learning and Teaching activities (Further Info)
Lecture Hours 30,
Seminar/Tutorial Hours 10,
Summative Assessment Hours 2,
Programme Level Learning and Teaching Hours 4,
Directed Learning and Independent Learning Hours
|Assessment (Further Info)
|Additional Information (Assessment)
||Students will be assessed 100% by in course assessment, split as follows;
Students will complete a written examination at the end of the course which covers the breadth of topics. Passing this test is required to pass the course.
Student will be expected to present up to two papers to the class over the course of the semester. Presentations will be marked on a combination of technical accuracy, presentation skills, and ability to lead a discussion.
Similar to the 'Informatics Research Review' course (INFR11136) students will conduct a literature review including reading papers and writing a final document which may require several editing rounds informed by their Tutor and peers.
||They will also be given formative and summative feedback about their understanding and their critical arguments when they present their selected paper in the lecture time from the lecturer running the course.
Students will be provided formative feedback on their literature review drafts such as peer-review on their literature surveys throughout the course during tutorials, as well as from the Tutor running the tutorial.
|No Exam Information
On completion of this course, the student will be able to:
- Demonstrate detailed understanding of the fundamental aspects of cyber security, privacy and trust.
- Develop ability to critically evaluate the literature related to their chosen topic, and to formulate academically-informed views on a range of security issues.
- Demonstrate ability to approach an open-ended topic, to research new ideas and experiment with new techniques.
- Write a thorough literature survey of a self-selected area of security, privacy, or trust (seeded by one or more of reading list papers).
|The text book will be Introduction to Computer Security (First Edition), Michael Goodrich and Roberto Tamassia, Pearson.|
Students will also be provided with lecture slides, a set of mandatory readings, and an optional set of further readings for those interested in specific topics. Students will also be provided with seed papers to assist with starting the literature review, but students will need to use their learned skills to find further readings on the specific literature review topic.
|Graduate Attributes and Skills
||1. Develop skills reading research papers and critically analysing the methodology, technical contributions, and evaluation.
2. Be able to synthesize knowledge from academic papers to create a systematization of knowledge.
3. Apply critical analysis, evaluation and synthesis to issues that are informed by forefront developments in the subject/discipline/sector.
|Keywords||SPT,Security,Privacy,Trust,Secure Systems,Privacy enhancing technologies
|Course organiser||Dr Mohammad Tariq Elahi
Tel: (0131 6)51 3257
|Course secretary||Ms Lindsay Seal
Tel: (0131 6)50 2701