MSc Security Technologies and Applications
- Programme director
- Mark Manulis
- Programme length
- Full-time: 12 months
- Programme start date
- September 2013
Become a security expert of the future and broaden your awareness and technical skills with this programme.
Programme overview
Cyber crime against businesses and electronic attacks against states are on the rise. The need for information security is obvious, and it is too challenging for any narrow field like cryptography or risk management. Security experts of the future will need a broad overview and awareness, as well as technical skills, and this programme aims to cover this range.
The programme benefits greatly from the Department’s strong links with industry. Guest lectures with around ten different speakers will provide an up-to-date view of the rapidly changing realities of information security. These guest lecturers are senior security experts from large international corporations, SMEs and government agencies.
The research strengths of the Department underpin the programme. The Department has been very successful in its work on e-voting and in watermarking and multimedia security. Network security is taught by the very successful group in the Centre for Communication Systems Research (CCSR).
This degree aims to train computer and information security professionals with in-depth, state-of-the-art knowledge and relevant skills, in response to the rapidly changing landscape of security technologies and applications. Many of today’s security technologies involve a combination of different fields, and this programme includes such technical areas as multimedia security, cryptography, network security, watermarking and web security.
Entry requirements
Candidates should have a Bachelors degree in computing or a cognate discipline from a UK university or the international equivalent. They should have obtained a minimum 2.1. In exceptional circumstances, work experience may also be considered if the candidate has achieved less than a 2.1.
English language requirements
IELTS minimum overall: 6.5
IELTS minimum by component:
6.0
We offer intensive English language pre-sessional courses, designed to take you to the level of English ability and skill required for your studies here.
Fees and funding
All fees are subject to increase or review for subsequent academic years. Please note that not all visa routes permit part-time study and overseas students entering the UK on a Tier 4 visa will not be permitted to study on a part-time basis.
| Programme name | Study mode | Start date | UK/EU fees | Overseas fees |
|---|---|---|---|---|
| MSc Security Technologies and Applications | Full-time | Sept 2013 | £6,720 | £15,160 |
Programme content
Compulsory Modules
- Network Technologies and Security
- Security and Cryptography
- Introduction to Multimedia Security
- Technologies and Applications
- Web-Hacking Countermeasures
- Information Security Management
- Advanced Multimedia Security
Optional Modules
- Project Management and Business Strategy
- Cloud Computing
Compulsory Modules
Network Technologies and Security
This module aims to equip you with both a theoretical and practical systematic understanding of the security challenges for communication networks, embracing internet, mobile and satellite communications. You will be presented with real-life problems, accompanied by practical and applied solutions.
Security and Cryptography
The aim of this module is to introduce the theoretical principles of private key and public key cryptography, and modelling and analysis techniques for security protocols that use cryptography.
Introduction to Multimedia Security
This module will provide an introductory background to various digital security technologies currently used in different applications for multimedia content and documents. The knowledge gained in this module will also serve as a prerequisite for students to attend the more advanced modules in security technologies and applications.
Technologies and Applications
In this module, a series of guest lecturers from industry give different perspectives on security challenges and solutions in their respective businesses, and of applications of security technologies in an industrial setting. Through a group project, you will explore a topic of your choice, setting material from other modules in an industrial context.
Web Hacking Countermeasures
During the last 15 years, web technologies have considerably changed the way we view and use computer systems. The open access nature makes web-based systems harder to keep secure than traditional systems and therefore have been the target to malicious cyber attacks. This module builds on modules taught in the first semester, related to computer security and Web application development, and looks at ways that security can be applied to web-based systems in order to make them resistant to attacks.
Information Security Management
Security is one of the greatest challenges for computer and information systems in the near future. Information security is a managerial problem as well as a technical one, and good security solutions depend on an ability to identify security requirements based on business needs and business processes. Thus, this module has a two-fold objective. It will look at how information systems can be managed and designed to fill actual business needs. It will also raise an awareness of the great range of security threats and how protection depends on a holistic view of the system.
Advanced Multimedia Security
This module follows on from Introduction to Multimedia Security, focusing on current topics in the area. Specifically, it covers the twin subjects of steganography and steganalysis. The developing field of image forensics is also introduced, in comparison with methodologies used in steganalysis. The module assumes a basic working knowledge of calculus and statistics, introducing tools from signal and image processing, information and coding theory, and other subjects as needed. Experiments on real images demonstrate the techniques used.
Optional Modules
Project Management and Business Strategy
Management is a pervasive, but frequently misunderstood, concept concerned with achieving satisfactory results in continually changing circumstances, particularly within organisations and involving people. Strategy is an important, but not always obvious, element in this activity. You will be better equipped for your life’s work, both in IT and beyond, if you have a basic understanding of the multi-dimensional nature of good management, together with the strengths and limitations of the strategic planning and implementation process.
Cloud Computing
This module provides an understanding of how, and why, cloud computing is quickly becoming a strategically important consideration for future industrial and research activities.
Professional recognition
The programme is accredited by the British Computer Society (BCS) and counts towards Chartered IT Professional (CITP) status. It is also partially recognised toward CSci and CEng.
Teaching
Taught master’s programmes in the Department of Computing utilise our research-active staff in conjunction with state-of-the-art facilities. We provide a range of learning experiences, including lectures, tutorials, directed study, practical laboratories and project work, which prepare graduates for their professional life.
We are particularly keen to develop, in all our students, a broad range of generic skills to complement the core technical or scientific competencies of their chosen subject area. Our modular programme format, coupled with the increasing use of innovative teaching and learning strategies such as e-learning and industrially focused short courses, provides a flexible study environment whilst maintaining academic rigour and quality.
Our record of graduate employment is outstanding, with Surrey graduates consistently being in high demand across all sectors.
Dissertation project
The MSc dissertation project makes up one third of the degree programme, starting towards the end of the first semester and completing at the end of the summer. During the project, you are supervised by a member of academic staff to advise and guide you to completion. At the end of the project, you must submit your bound dissertation, which forms a complete record of the project.
The project focuses in depth on a subject at the leading edge of computing. For example, projects can undertake the development of a software system to solve a particular problem, possibly in collaboration with an industrial partner.
Alternatively, projects can be research-based, in which case an aspect of computing is investigated, perhaps to evaluate particular techniques or propose a new algorithm. These projects are usually closely linked to the Department’s research strengths.
Whatever the topic, you are expected to develop a critical understanding of the methods and technologies needed, then implement and evaluate your chosen solution to a professional standard. Project planning and time management is an important part of the experience.
Project examples
David Lundin – E-voting Project
Elections across the globe have become high-profile events, not least because of their controversy, such as the American presidential election of 2000. One way in which elections can be made more reliable is through the use of electronic voting systems, which can provide security and verifiability.
Some electronic voting systems, such as Prêt à Voter and Punchscan, use a pre-printed paper ballot form, part of which is destroyed to create an encrypted receipt of the vote. The voter can use this receipt to check online that his or her vote has been included in the tally, but as the receipt is encrypted, it cannot be used to prove which candidate the vote is for. The problem with these ballot forms is that anyone who can see them before they are used has sufficient knowledge to check the contents of an encrypted receipt without it having to be properly decrypted.
In David’s MSc project, he developed a method based on visual encryption of the candidate list that hides the content of the ballot form until the moment when it is used by the voter in the voting booth. When the top layer, printed on the ballot form, is properly aligned over the bottom layer, displayed on a computer screen, the candidate list appears in plain text. When the form is removed from the screen, the content of the form is once again hidden.
Ian Golledge – Identifying and Classifying Electronic Spam
This project presents a prototype model for implementing a self-organising map as a spam filter. A method is shown where emails are converted into feature vectors, where features represent keywords. Keywords are selected from an analysis of an email corpus, with the results ranked based on word frequency measurements. The project describes phases of design which attempt to improve on feature selection and conclude on a prototype model for spam filtering using the self-organising map.
This prototype model is evaluated over six datasets of fluctuating ratios of ham and spam, with testing designed to emulate the incremental re-training of a personalised spam filter. The results are compared to common techniques in spam filtering. Initial results show the model can outperform popular Naive Bayesian techniques. The feature vector representation is then further developed and the model shows results that compare strongly against other classifiers identified in research, demonstrating effective application of self-organising maps for spam filtering.
The work was published at an international IEEE-sponsored conference in Italy:
Vrusias, B. and Golledge, I. (2008). ‘Adaptable text filters and unsupervised neural classifiers for spam detection’, Advances in Soft Computing, 53, 195–202.
Aaron Randall – Authentication and Self-Restoration of Watermarked Images
In an age where digital media use is prolific, accessible and cost-effective, the requirement for digital images to be used in such situations as evidence in court, medical imaging, traffic enforcement and forensics is increasingly important
However, along with digital media use, many different techniques to alter media files digitally have been developed – some with very realistic results. The ramifications of using potentially tampered digital media as evidence in court, for example, could cause the difference between an innocent or guilty verdict. This is an issue that digital watermark authentication and restoration attempts to answer.
Aaron’s MSc project was to develop an image authentication and restoration system capable of localising manipulated regions of an image. Through iterative restoration techniques and the extraction of hidden data from the image itself, he would then attempt to restore damaged regions. The first step of authentication highlighted any regions of the image that the application believed to have been tampered with in some way (such as cropping, blurring or other image manipulation techniques). The restoration stage then looked at fixing the regions highlighted as tampered. This step extracted hidden data from the image and inserted it back into the relevant damaged regions.
Our department
The Department of Computing is an active department within the Faculty of Engineering and Physical Sciences. There are 19 full-time academic staff and around 400 students at all levels – from undergraduate through to PhD. The Department is proud of its friendly reputation and aims to provide a supportive environment for students.
The Computing degree programmes at the University of Surrey and the all-round student experience are highly rated in the National Student Survey and league table results. The undergraduate and MSc postgraduate degree programmes are stimulating and challenging, with a high level of practical content. The Department is constantly exploring the use of new technology in teaching – such as podcasts and voting handsets – to support greater interactivity, accessibility and enjoyment of lectures. It also organises extra-curricular activities for those who want to explore other aspects of computing in more depth, while supporting local schools and colleges to bring some of the exciting aspects of computing to school pupils.
The Department’s research interests are many and varied, ranging across the research groups of Digital Ecosystems; Formal Methods and Security; Multimedia Security and Forensics; and Nature-Inspired Computing and Engineering. With a strong research culture and a growing research profile, the Department of Computing has won several prizes, including the University Voting Systems Competition System Design award in 2007 and the prestigious Institution of Engineering and Technology Innovation in Engineering Security award in 2006.
Our degree programmes
The Department offers four MSc programmes. Each with its own distinct focus, all of them offer a taste of the Department’s specialisms.
Internet Computing, Security Technologies and Applications, and Computational Intelligence and Computational Biology are technical degrees requiring a solid background in computing or a cognate discipline.
The MSc in Information Systems is a more generalist degree, accepting students from a wider range of backgrounds. It takes a more high-level, overall view on information technologies, and prepares students for managerial rather than technical roles in their future careers. It covers business and management topics as well as technical computing subjects.
The MSc in Security Technologies and Applications is specialised towards the Department’s multiple activities in relation to the technologies and principles that underlie a variety of information security techniques and technologies.
The MSc in Internet Computing is concerned with distributed information and computing resources, and builds from the Department’s activities relating to the Web and the Cloud.
The programme also has a strong element of more general, technical computer science and software development skills.
The MSc in Computational Intelligence and Computational Biology is the latest addition to the portfolio of programmes, following the appointment of a Professor of Computational Intelligence and the subsequent growth of a nature-inspired computing theme in the Department.
All of the programmes benefit from the strong research community and industrial partnerships of the Department. In particular, the dissertation project allows students to work on a topic in one of the key research areas. Even though the programmes share many modules, each has its own focus and direction.
Regardless of which programme you choose, we are committed to making your year at Surrey a valuable and enjoyable experience.
Industry sponsors and prizes
The Department benefits greatly from strong links with industry, and our industry partners support the programme in various ways, some with guest lectures and some with prizes for the best student performance (typically £150–200 per prize).
Scholarships
The Department pays a scholarship of £1,000 to students with a first-class honours degree or equivalent, who do not receive any other scholarship or bursary from the University. Please see the Department web pages for the full conditions.
Department links
Contact us
For general enquiries
0800 980 3200 or +44 (0)1483 681 681
For admissions enquiries
+44 (0)1483 686 050
