Availabilities:

Location Domestic International
Coffs Harbour Session 1 Session 1
Online Session 1 Session 1
Papua New Guinea - IBSU Enga N/A Session 1
Papua New Guinea - IBSU Port Moresby N/A Session 1

Unit Summary

Unit type

UG Coursework Unit

Credit points

12

AQF level

7

Level of learning

Advanced

Unit aim

Introduces students to the various controls which can be implemented in information systems to guard against both intentional and unintentional threats. Students will examine techniques by which combinations of controls can be jointly implemented to provide effective countermeasures against threats. Students will apply risk analysis techniques to the development of security plans and security strategies.

Unit content

Topic 1 Overview & fundamental concepts of computer security.

Topic 2 Cryptography

Topic 3 Authentication & access control

Topic 4  Risk assessment & planning

Topic 5 Network security 1 - malicious software & denial of service

Topic 6 Network security 2 - intrusion detection & intrusion prevention

Topic 7 Human factors in security management & legal & ethical considerations

Topic 8 Physical & infrastructure security

Topic 9 Internet security

Topic 10 Software security and security models

 

Learning outcomes

Unit Learning Outcomes express learning achievement in terms of what a student should know, understand and be able to do on completion of a unit. These outcomes are aligned with the graduate attributes. The unit learning outcomes and graduate attributes are also the basis of evaluating prior learning.

GA1: , GA2: , GA3: , GA4: , GA5: , GA6: , GA7:
On completion of this unit, students should be able to: GA1 GA2 GA3 GA4 GA5 GA6 GA7
1 Explain the need for controls in information systems to counter both intentional and unintentional threats
2 Describe controls which can be implemented to counter threats to specific information systems assets
3 Describe the major ethical and legal issues with respect to control and security of information
4 Apply risk analysis and audit techniques to the determination of controls and countermeasures
5 Develop security plans and security strategies for information systems.

On completion of this unit, students should be able to:

  1. Explain the need for controls in information systems to counter both intentional and unintentional threats
    • GA1:
    • GA4:
    • GA5:
  2. Describe controls which can be implemented to counter threats to specific information systems assets
    • GA1:
    • GA4:
    • GA5:
  3. Describe the major ethical and legal issues with respect to control and security of information
    • GA1:
    • GA3:
    • GA4:
  4. Apply risk analysis and audit techniques to the determination of controls and countermeasures
    • GA1:
    • GA4:
    • GA5:
  5. Develop security plans and security strategies for information systems.
    • GA1:
    • GA4:
    • GA5:

Prescribed texts

  • Stallings, W & Brown, L , 2015, Computer Security Principles and Practice, 3rd edn, Pearson International (Global) Edition, Pearson Education Inc, USA. ISBN: 9781292066172.
Prescribed texts may change in future teaching periods.