Undergraduate Course: Security Engineering (UG) (INFR11228)
|School||School of Informatics
||College||College of Science and Engineering
|Credit level (Normal year taken)||SCQF Level 11 (Year 4 Undergraduate)
||Availability||Available to all students
|Summary||This course follows the delivery and assessment of Security Engineering (INFR11208) exactly. Undergraduate students must register for this course, while MSc students must register for INFR11208 instead.
This course follows the delivery and assessment of Security Engineering (INFR11208) exactly. Undergraduate students must register for this course, while MSc students must register for INFR11208 instead.
Entry Requirements (not applicable to Visiting Students)
|| It is RECOMMENDED that students have passed
Research Methods in Security, Privacy, and Trust (INFR11188) OR
Computer Security (INFR10067)
|Prohibited Combinations|| Students MUST NOT also be taking
Security Engineering (INFR11208)
||Other requirements|| This course follows the delivery and assessment of Security Engineering (INFR11208) exactly. Undergraduate students must register for this course, while MSc students must register for INFR11208 instead.
We assume a basic understanding of access controls, cryptography and security protocols, as well as of usability and distributed systems. A student who has not taken courses on these topics, must become familiar with the material by reading chapters 1-7, 9 and 11 of Ross Anderson's Security Engineering (3rd Edition) before the start of this course.
Information for Visiting Students
|High Demand Course?
Course Delivery Information
|Academic year 2022/23, Available to all students (SV1)
|Learning and Teaching activities (Further Info)
Lecture Hours 16,
Feedback/Feedforward Hours 3,
Summative Assessment Hours 2,
Programme Level Learning and Teaching Hours 2,
Directed Learning and Independent Learning Hours
|Assessment (Further Info)
|Additional Information (Assessment)
||Feed-forward and feedback hours will be used to give students feedback on the literature reviews. For the literature review, we will also give about one sentence of feedback on each aspect of the exercise.
||Hours & Minutes
|Main Exam Diet S2 (April/May)||Security Engineering (UG) (INFR11228)||2:00|
On completion of this course, the student will be able to:
- Identify ways of attacking a real-world system, leading to a threat model, a security policy, protection goals and assurance targets
- Use adversarial thinking to analyse the relationships between threats, hazards, actors and defence mechanisms
- Compare and synthesise the perspectives of different system stakeholders and threat actors, using economic and psychological viewpoints as well as technical ones
- Demonstrate critical thinking about unsolved problems, residual risk and emerging threats as systems scale or their environment changes
|Ross Anderson, Security Engineering: A Guide to Building Dependable Distributed Systems, Wiley (Third Edition 2020)|
|Graduate Attributes and Skills
|Course organiser||Mr Yuvraj Patel
Tel: (0131 6)50 4425
|Course secretary||Mrs Helen Tweedale
Tel: (0131 6)50 2692