Skip to main content

Unit information: Introduction to Mathematical Cybersecurity in 2018/19

Please note: you are viewing unit and programme information for a past academic year. Please see the current academic year for up to date information.

Unit name Introduction to Mathematical Cybersecurity
Unit code MATHM0028
Credit points 10
Level of study M/7
Teaching block(s) Teaching Block 1A (weeks 1 - 6)
Unit director Professor. Rubin-Delanchy
Open unit status Not open
Pre-requisites

Probability 1, Statistics 1 and Statistics 2 (or equivalent)

Co-requisites

None

School/department School of Mathematics
Faculty Faculty of Science

Description including Unit Aims

Students will gain literacy in mathematical aspects of fundamental cyber security concepts, and gain the ability to convert these ideas into mathematical descriptions.

This unit will cover the following topics: how the internet works; computer security and encryption; vulnerabilities and cyber attacks; understanding the data; mathematical models such as graphs and point processes; probabilistic reasoning.

Intended Learning Outcomes

ILO1 To be able to qualitatively describe how computers communicate via the internet, and relate this to how it is quantitatively measured

ILO2 To understand how communications and computers are secured, and be able to describe how this is exploited by cyber attacks

ILO3 To have a high-level understanding of how mathematical models relate to cyber data

ILO4 To interpret applied cybersecurity reports from industry and academia and put them in a mathematical context

Teaching Information

3 lectures per week for 6 weeks, to include 15 hours of new material and 3 hours of problem classes.

Assessment Information

Written exam (100%)

Reading and References

Dunlavy, Daniel M., Bruce Hendrickson, and Tamara G. Kolda. Mathematical challenges in cybersecurity, Sandia Report, 2009.

Verizon Data Breach Investigations Report, http://www.verizonenterprise.com/verizon-insights-lab/dbir/2017/ 2017.

FireEye Annual Cyber Threat Reports, https://www.fireeye.com/current-threats/annual-threat-report.html 2017

Further Reading:

Alpcan, Tansu and Tamer Basar, Network Security: A Decision and Game Theoretic Approach, Cambridge University Press, 2011.

Adams, Niall and Nick Heard, Dynamic Networks and Cyber-security, World Scientific, 2016.

Adams, Niall and Nick Heard, Data analysis for network cyber-security, World Scientific, 2014.

Feedback