University of London

Small Navigation Menu

Primary Menu

Computer security

IYM004

This course deals with the more technical means of making a computing system secure.

This process starts with defining the proper security requirements, which are usually stated as a security policy. Security models formalise those policies and may serve as a reference to check the correctness of an implementation. The main security features and mechanisms in operating systems will be examined as well as security related issues of computer architecture. Specific well-known operating systems are then studied as case studies. Other areas investigated include the security of middleware, software protection and web security.

Topics covered

  • Your Computer
  • Computer security theory
  • Operating system case studies
  • Software and application security

Learning outcomes

If you complete the course successfully, you should be able to:

  • Demonstrate an understanding of the importance of security models with reference to the security of computer systems.
  • Describe the features and security mechanisms which are generally used to implement security policies.
  • Provide examples of the implementation of such features and mechanisms within particular operating systems.
  • Display a breadth of knowledge of the security vulnerabilities affecting computer systems.
  • Demonstrate an understanding of the main issues relating to Web security in the context of computer systems.

Assessment

This module is assessed by a two hour unseen written examination.

Essential reading

  • Computer Security 3rd Ed. (Gollman)