Telecommunications and Device Security

Postgraduate | 2026

Course page banner
area/catalogue icon
Area/Catalogue
COMP 6033
Course ID icon
Course ID
205853
Level of study
Level of study
Postgraduate
Unit value icon
Unit value
6
Course level icon
Course level
6
Study abroad and student exchange icon
Inbound study abroad and exchange
Inbound study abroad and exchange
The fee you pay will depend on the number and type of courses you study.
No
University-wide elective icon
University-wide elective course
No
Single course enrollment
Single course enrolment
No
alt
Note:
Course data is interim and subject to change

Course overview

In this course, students will design, analyse and implement effective security for telecommunication devices and systems. Content includes: Overview of frameworks for threat assessment (e.g., MITRE ATT and CK and MITRE ATLAS) and threat mitigation (e.g., NIST Cybersecurity Framework, MITRE D3FEND, Lockheed Martin's Cyber Kill Chain, Systems Security Engineering Framework, ISO/IEC/IEEE 15288); Device security at the hardware level: hardware-enabled security and platform trust, common vulnerabilities (top CWEs), common attacks (e.g., hardware trojan, side-channel analysis), common defences (e.g., physical unclonable function, trusted computing technologies including Trusted Platform Module and Trusted Execution Environment); Device security at the software level: common vulnerabilities (top CWEs, OWASP top 10), common attacks (cyber threat trends), common defences (e.g., safe programming languages, application security testing, verified microkernels), novel attacks and emerging defences (e.g., adversarial machine learning); Network security at the physical layer (electronic warfare and physical-layer security), data link layer (reactive jamming, cognitive anti-jamming), network layer (L3 distributed denial of service, attacks on routing and countermeasures), and upper layers (L4 and L4 distributed denial of service, protocol verification using formal methods, cryptographic protocols); Specific focus on two security measures: (i) quantum key distribution, (ii) threat detection using security information and event management (SIEM) and machine learning; Examples drawn from the latest developments in space networks, including Solar System Internetwork as well as other CCSDS-defined architectures and protocols.

Course learning outcomes

  • Explain systems security engineering concepts, and among these concepts, apply threat and vulnerability assessment to telecommunication devices and systems.
  • Identify and analyse attack vectors relevant to an attack surface, and accordingly, design a security plan.
  • Explain the principles of some common attacks and corresponding defences.
  • Identify and analyse the impact of an attack, and based on the analysis, design a countermeasure.
  • Against an attack, implement and evaluate a countermeasure.
  • Apply research methodology to analyse and discuss a contemporary topic on telecommunications and device security.

Prerequisite(s)

N/A

Corequisite(s)

N/A

Antirequisite(s)

N/A