入学要求 Requirement:
学术要求:Candidates should have a first degree in computing or cognate discipline from a UK university or the international equivalent. They should have obtained the degree at Upper Second level or higher. In exceptional circumstances, work experience may also be considered if the candidate has achieved less than Upper Second.
英语要求:Non-native speakers of English will normally be required to have IELTS 6.5 or above (or equivalent).
学费 Tuition Fee:2011/2012 12500pounds
课程特征 Course Features
Cyber crime against businesses and electronic attacks against states are on the rise. The need for information security is obvious, and it is too challenging for any narrow field like cryptography or risk management. Security experts of the future will need a broad overview and awareness as well as technical skills, and this programme aims to cover this range.
The programme benefits greatly from the Department's strong links with industry. Guest lectures with about ten different speakers will provide an up-to-date view of the rapidly changing realities of information security. The guest lecturers are senior security experts from large international corporations, SMEs and government agencies.
The research strengths of the Department underpin the programme. The Department has been very successful in e-voting and in watermarking and multimedia security. Network security is taught by the very successful group in the Centre for Communication Systems Research (CCSR).
This degree aims to train computer and information security professionals with in-depth, state-of-the-art knowledge and relevant skills in response to the rapidly changing landscape in security technologies and applications. Many of today's security technologies involve a combination of different fields, and this programme includes such technical areas as multimedia security, cryptography, network security, watermarking and web security.
课程内容 Course Content :
Compulsory Modules
Information Security Management
Security is one of the greatest challenges for computer and information systems in the near future. Information security is a managerial problem as well as a technical one, and good security solutions depend on an ability to identify security requirements based on business needs and business processes. Thus, this module has a two-fold objective. It will look at how information systems can be managed and designed to fill actual business needs. It will also raise an awareness of the great range of security threats and how protection depends on a holistic view of the system.
Introduction to Multimedia Security
This module will provide an introductory background to various digital security technologies currently used in different applications for multimedia content and documents. The knowledge gained in this module will also serve as a prerequisite for students to attend the more advanced modules in security technologies and applications.
Network Security
This module aims to equip you with both a theoretical and a practical systematic understanding of the security challenges for the next generation of communication networks, embracing Internet, mobile and satellite communications security. You will be presented with real-life security problems accompanied by practical and applied solutions.
Security and Cryptography
The aim of this module is to introduce the theoretical principles of private key and public key cryptography, and modelling and analysis techniques for security protocols that use cryptography.
Technologies and Applications
In this module, a series of guest lecturers from industry give different perspectives on security challenges and solutions in their respective businesses, and of applications of security technologies in an industrial setting. Through a group project, you will explore a topic of your choice, setting material from other modules in an industrial context.
Optional Modules
Challenges for Computing Professionals
IT professionals need to appreciate that technologies do not exist in isolation; they require a broad understanding of law and ethics that will enable them to assess the potential risks of, rather than to, a project, from a variety of perspectives in any technology-related undertaking.
Digital Watermarking and Authentication
This module will equip you with a critical awareness of conventional and non-conventional orthogonal transform watermarking techniques for different applications, including robust watermarking for copyright protection, fragile and semi-fragile watermarking for authentication, unintentional and intentional or malicious attacks, as well as advanced recovery techniques to restore watermarks. Through laboratory sessions, you will apply your theoretical understanding in developing and evaluating a digital watermarking system prototype for image authentication and restoration.
Web Hacking Countermeasures
During the last 15 years, web technologies have considerably changed the way we view and use computer systems. The open access nature makes web-based systems harder to keep secure than traditional systems. This new module, being delivered for the first time in 2009/10, will build on autumn modules in Computer Security and in Enterprise Systems Development and look at concrete security problems in web-based systems.
Agile Web Development
The development of Interactive Web Applications is a rapidly growing area. In the highly dynamic environment of the World Wide Web, those who can rapidly develop and deploy innovative web applications provide themselves with a strong competitive advantage. Web application development frameworks such as Ruby on Rails and Django are rapidly gaining support as highly productive development frameworks. This course focuses on Ruby on Rails, and provides hands-on experience of the rapid development of web applications using a method that guarantees strong engagement with the customers' needs.
教学与评估 Teaching and Assessment:
Teaching
Taught Masters programmes in the Department of Computing utilise our research-active staff in conjunction with state-of-the-art facilities. We provide a range of learning experiences including lectures, tutorials, directed study, practical laboratories and project work that prepare graduates for their professional life.
We are particularly keen to develop, in all our students, a broad range of generic skills to complement the core technical or scientific competencies of their chosen subject area. Our modular programme format, coupled with the increasing use of innovative teaching and learning strategies such as e-learning and industrially focused short courses, provides a flexible study environment whilst maintaining academic rigour and quality.
Our record of graduate employment is outstanding, with Surrey graduates consistently being in high demand across all sectors.
其它信息 Other Information:
Industry Sponsors and Prizes
The Department benefits greatly from strong links with industry, and our industry partners support the programme in various ways; some with guest lectures and some with prizes for the best student performance (typically £150-200 per prize).
Scholarships
The Department pays a scholarship of £500 to students with a First class honours degree or equivalent, who do not receive any other scholarship or bursary from the University. Please see the Department web pages for the full conditions.
Our Department
The Department of Computing is a research-active department with 16 full-time academic staff, and around 350 students at all levels from undergraduate through to PhD. We are proud of our reputation as a friendly department and aim to provide a supportive environment for our student population.
We have strong links with industry, including industrially funded research projects and doctoral students, and are involved in a number of Knowledge Transfer Partnerships with companies across the UK.
The Department has a strong research culture and a growing research profile. Our research specialisms and activities inform our teaching on the Masters programmes, both with respect to particular MSc modules, and also in terms of the MSc projects that our students can pursue. Masters students in the Department will surely note the large groups in information security and in computational intelligence.
Our security research covers externally funded projects in electronic voting, in image forensics and digital watermarking, and in security contact-less payment systems. Disciplines employed include cryptology, protocol analysis, image and signal processing, and antenna design.
The research group for Biologically Inspired Modelling and Applications includes research on machine-learning and computational intelligence, with applications in security and surveillance, natural language processing, medical imaging, and biological classification. This group also takes an interest in emerging technologies for Internet computing, such as cloud computing and semantic web.
Other groups, although possibly less visible in the MSc programmes, have also been very successful. The Digital Ecosystems Group and the formal methods activity focus fundamental research on theories and techniques that will be required to support new generations of pervasive computing systems, and are developing analytical modelling techniques to support the development of high-quality complex reactive systems.