COMPX518-22A (HAM)

Cyber Security

15 Points

Edit Header Content
Division of Health Engineering Computing & Science
School of Computing and Mathematical Sciences
Department of Computer Science

Staff

Edit Staff Content

Convenor(s)

Lecturer(s)

Administrator(s)

: maria.admiraal@waikato.ac.nz

Placement/WIL Coordinator(s)

Tutor(s)

Student Representative(s)

Lab Technician(s)

Librarian(s)

: alistair.lamb@waikato.ac.nz

You can contact staff by:

  • Calling +64 7 838 4466 select option 1, then enter the extension.
  • Extensions starting with 4, 5, 9 or 3 can also be direct dialled:
    • For extensions starting with 4: dial +64 7 838 extension.
    • For extensions starting with 5: dial +64 7 858 extension.
    • For extensions starting with 9: dial +64 7 837 extension.
    • For extensions starting with 3: dial +64 7 2620 + the last 3 digits of the extension e.g. 3123 = +64 7 262 0123.
Edit Staff Content

Paper Description

Edit Paper Description Content

This paper provides an extensive overview of the key topics in the field of cyber security. Selective topics from a wide range, such as security vulnerabilities, cryptography, applied cryptography, authentication and access control, information security management, etc., will be covered.

The learning outcomes for this paper are linked to Washington Accord graduate attributes WA1-WA11. Explanation of the graduate attributes can be found at: https://www.ieagreements.org/

Edit Paper Description Content

Paper Structure

Edit Paper Structure Content
The lectures maybe online or in-person, in either case class attendance is expected. The course notes provided are not comprehensive, additional material will be covered in class. You are responsible for all material covered in class.
Edit Paper Structure Content

Learning Outcomes

Edit Learning Outcomes Content

Students who successfully complete the paper should be able to:

  • Differentiate between and implement various authentication and access control mechanisms for security [WA1, WA5]
    Linked to the following assessments:
  • Analyse a system for specific vulnerabilities [WA1, WA2]
    Linked to the following assessments:
  • Describe various aspects of operating system security. [WA1]
    Linked to the following assessments:
  • Apply cryptography to achieve specific security objectives such as of confidentiality, integrity and availability [WA1, WA5]
    Linked to the following assessments:
  • Carry out threat modelling to design secure systems [WA2,WA3]
    Linked to the following assessments:
Edit Learning Outcomes Content
Edit Learning Outcomes Content

Assessment

Edit Assessments Content
If you are enrolled on a BE(Hons), samples of your work may be required as part of the Engineering New Zealand accreditation process for BE(Hons) degrees. Any samples taken will have the student name and ID redacted. If you do not want samples of your work collected then please email the engineering administrator, Natalie Shaw (natalie.shaw@waikato.ac.nz), to opt out.
Edit Additional Assessment Information Content

Assessment Components

Edit Assessments Content

The internal assessment/exam ratio (as stated in the University Calendar) is 100:0. There is no final exam. The final exam makes up 0% of the overall mark.

The internal assessment/exam ratio (as stated in the University Calendar) is 100:0 or 0:0, whichever is more favourable for the student. The final exam makes up either 0% or 0% of the overall mark.

Component DescriptionDue Date TimePercentage of overall markSubmission MethodCompulsory
1. Weekly Quiz
20
  • Online: Submit through Moodle
2. Assignment 1
20
  • Online: Submit through Moodle
3. Assignment 2
20
  • Online: Submit through Moodle
4. Assignment 3
20
  • Online: Submit through Moodle
5. Test 1 : Mid-trimester
10
  • Online: Submit through Moodle
6. Test 2: End of trimester
10
  • Online: Submit through Moodle
Assessment Total:     100    
Failing to complete a compulsory assessment component of a paper will result in an IC grade
Edit Assessments Content

Required and Recommended Readings

Edit Required Readings Content

Required Readings

Edit Required Readings Content
Readings are topical, and will be advised during each lecture.
Edit Required Readings Content

Recommended Readings

Edit Recommended Readings Content

Recommended Readings are topical, and will be advised during each lecture.

Edit Recommended Readings Content

Online Support

Edit Online Support Content
All online support will be provided via Moodle. Forums are created for students to ask questions and contribute ideas and topics. Dedicated forums for Assignments are also created.
Edit Online Support Content

Workload

Edit Workload Content

Per week:

2 hours - Lectures

10 hours - Assignments and Readings

Edit Workload Content

Linkages to Other Papers

Edit Linkages Content
This is a required paper for the qualification of Master of Cyber Security (MCS)
Edit Linkages Content

Prerequisite(s)

Prerequisite papers: COMP202 or COMPX204 and a further 45 points at 300 level in Computer Science

Corequisite(s)

Equivalent(s)

Restriction(s)

Restricted papers: COMP418

Edit Linkages Content