Data Security and Networking
Level 5, 20 Credits.
We have 1 upcoming course
(Thursdays from 6:30 pm to 9:00 pm plus 1 Saturday Day School)
Download Enrolment Form
- Thursdays from 6:30 pm to 9:00 pm plus 1 Saturday Day School
- 14 weekly meetings
- Dr Mike Evans
- Mr Huw Gulliver
- Mr Mike Daley
- Mr Simon Young
- Computer Science Department
(entrance via The Parade)
- Fee £435.00 (Concessionary Fee £392.00)
Please note: This course has started but may still have places available. Call us on: (029) 2087 0000 to find out about late availability.
This module aims to introduce students to the major problems of security in running a public service computer system. The topics covered in this module include a discussion of the basic internet protocols (TCP, UDP, ICMP) and network applications (Telnet, FTP, e-mail), an introduction to network and host security, network design and implementation, the anatomy of computer viruses, practical networking, common topologies, components, testing and use of logs from backups to investigate breaches of security. This module includes a practical class that allows students to try termination of fibre-optics and setting up a small local area network. On completion of the module, a student should be able to control access to services on a workstation and analyse TCP/IP network traffic using a protocol analyser.
Who is this course for?
This course is ideal for the student who wants a good general introduction to Data Security and Networking.
Learning and Teaching
This module includes a mix of traditional lectures and laboratory sessions. Each meeting starts with a lecture and finishes with a laboratory session. This module includes a practical class that allows students to try both termination of fibre-optics and setting up a small local area network. On completion of the module, a student should be able to control access to services on a workstation and analyse TCP/IP network traffic using a protocol analyser.
Coursework and Assessment
To award credits we need to have evidence of the knowledge and skills you have gained or improved. Some of this has to be in a form that can be shown to external examiners so that we can be absolutely sure that standards are met across all courses and subjects.
Students will sit a written class test at the end of the course.
The most important element of assessment is that it should enhance your learning. Our methods are designed to increase your confidence and we try very hard to devise ways of assessing you that are enjoyable and suitable for adults with busy lives.
- Introduction to both Windows and UNIX
- Redirection of input and output and piping
- Discussion of factors that impact on a centralised backup over the network
- Demonstration of centralised backup over the network
- Introduction to Networking
- Disabling services on a workstation
- Controlling access to services on a workstation using the TCP wrapper package
- Using Secure Shell (ssh) and Secure FTP (sftp) instead of telnet and ftp so that data is encrypted before it is transmitted over the network.
- Use of the cron facility on UNIX and the Windows scheduler to schedule regular jobs on a server to save logs which may be required when there is unauthorised access to a system
- Discussion of the layers of the Internet model
- Explanation of the 48 bit station address used by the Ethernet protocol
- Discussion of the differences between the User Datagram Protocol (UDP) and the Transmission Control Protocol (TCP)
- Explanation of the terms netmask, default router and DNS server
- Discussion of the Domain Name service (DNS) database structure
- The default allow and default deny security policies
- Firewall and packet filtering router rules to permit or deny a connection
- Authentication and authorisation
- Discussion of common services (FTP,SMTP,DNS and HTTP)
- Discussion of format of headers from e-mail messages
- Network components and topologies
- Wide Area Network (WAN), Local Area Network (LAN) and Wireless Local Area Network (WLAN)
- Study of star, bus and ring network topologies.
- The role of repeaters/hubs in a network
- Comparison of a switch and a hub
- Comparison of a bridge and routers in a network
- History of computer viruses.
- Boot Sector, File viruses, Worms and Macro viruses
- Modes of infection. Methods of eradication.
Santifaller, M (1994) TCP/IP and ONC/NFS (2/E). Addison Wesley
Library and Computing Facilities
As a student on this course you are entitled to join and use the University library and computing facilities. You can find out more about these facilities on our website www.cardiff.ac.uk/learn under Student Information, or by ringing the Centre on
(029) 2087 0000.
Accessibility of Courses
Our aim is access for all. We aim to provide a confidential advice and support service for any student with a long term medical condition, disability or specific learning difficulty. We are able to offer one-to-one advice about disability, pre-enrolment visits, liaison with tutors and co-ordinating lecturers, material in alternative formats, arrangements for accessible courses, assessment arrangements, loan equipment and Dyslexia screening. Please contact the Centre on (029) 2087 0000 for an information leaflet.
A range of further information can be found on our web site www.cardiff.ac.uk/learn or in Choices. This includes the times and dates of courses and an explanation of accreditation and credit levels.