Undergraduate Course: Security Engineering (UG) (INFR11228)
Course Outline
School | School of Informatics |
College | College of Science and Engineering |
Credit level (Normal year taken) | SCQF Level 11 (Year 4 Undergraduate) |
Availability | Available to all students |
SCQF Credits | 10 |
ECTS Credits | 5 |
Summary | This course follows the delivery and assessment of Security Engineering (INFR11208) exactly. Undergraduate students must register for this course, while MSc students must register for INFR11208 instead. |
Course description |
This course follows the delivery and assessment of Security Engineering (INFR11208) exactly. Undergraduate students must register for this course, while MSc students must register for INFR11208 instead.
|
Entry Requirements (not applicable to Visiting Students)
Pre-requisites |
It is RECOMMENDED that students have passed
Research Methods in Security, Privacy, and Trust (INFR11188) OR
Computer Security (INFR10067)
|
Co-requisites | |
Prohibited Combinations | Students MUST NOT also be taking
Security Engineering (INFR11208)
|
Other requirements | This course follows the delivery and assessment of Security Engineering (INFR11208) exactly. Undergraduate students must register for this course, while MSc students must register for INFR11208 instead.
We assume a basic understanding of access controls, cryptography and security protocols, as well as of usability and distributed systems. A student who has not taken courses on these topics, must become familiar with the material by reading chapters 1-7, 9 and 11 of Ross Anderson's Security Engineering (3rd Edition) before the start of this course. |
Information for Visiting Students
Pre-requisites | As above. |
High Demand Course? |
Yes |
Course Delivery Information
Not being delivered |
Learning Outcomes
On completion of this course, the student will be able to:
- identify ways of attacking a real-world system, leading to a threat model, a security policy, protection goals and assurance targets
- use adversarial thinking to analyse the relationships between threats, hazards, actors and defence mechanisms
- compare and synthesise the perspectives of different system stakeholders and threat actors, using economic and psychological viewpoints as well as technical ones
- demonstrate critical thinking about unsolved problems, residual risk and emerging threats as systems scale or their environment changes
|
Reading List
Ross Anderson, Security Engineering: A Guide to Building Dependable Distributed Systems, Wiley (Third Edition 2020) |
Additional Information
Graduate Attributes and Skills |
Not entered |
Keywords | SEng,computer security,systems,cybersecurity |
Contacts
Course organiser | Mr Yuvraj Patel
Tel: (0131 6)50 4425
Email: Yuvraj.Patel@ed.ac.uk |
Course secretary | Miss Yesica Marco Azorin
Tel: (0131 6)50 5194
Email: ymarcoa@ed.ac.uk |
|
|