Availabilities:

Location Domestic International
China - Guangxi UST N/A Session 1
Melbourne N/A Session 1
Online Session 1 Session 1,  1
Papua New Guinea - IBSU Enga N/A Session 1
Papua New Guinea - IBSU Port Moresby N/A Session 1
Sydney N/A Session 1

Unit Summary

Unit type

UG Coursework Unit

Credit points

12

AQF level

7

Level of learning

Advanced

Unit aim

Covers the various controls which can be implemented in information systems to guard against both intentional and unintentional threats. Students will examine techniques by which combinations of controls can be jointly implemented to provide effective countermeasures against threats. Students will apply risk analysis techniques to the development of security plans and security strategies.

Unit content

Topic 1 Overview & fundamental concepts of computer security.

Topic 2 Cryptography

Topic 3 IT security risk assessment

Topic 4 IT security planning

Topic 5 Authentication

Topic 6 Access control & security models

Topic 7 Network security 1: malicious software

Topic 8 Network security 2: denial of service

Topic 9 Network security 3: intrusion detection & intrusion prevention

Topic 10 Human factors in security management & legal & ethical considerations

Topic 11 Physical & infrastructure security

Topic 12 Internet security

Learning outcomes

Unit Learning Outcomes express learning achievement in terms of what a student should know, understand and be able to do on completion of a unit. These outcomes are aligned with the graduate attributes. The unit learning outcomes and graduate attributes are also the basis of evaluating prior learning.

GA1: , GA2: , GA3: , GA4: , GA5: , GA6: , GA7:
On completion of this unit, students should be able to: GA1 GA2 GA3 GA4 GA5 GA6 GA7
1 Analyse information system and business context to counter both intentional and unintentional threats
2 Choose controls which can be implemented to counter threats to specific information systems assets
3 Describe the ethical and legal issues with respect to control and security of information
4 Apply risk analysis techniques to determine the controls and countermeasures
5 Develop security plans and security strategies for information systems.

On completion of this unit, students should be able to:

  1. Analyse information system and business context to counter both intentional and unintentional threats
    • GA1:
    • GA5:
  2. Choose controls which can be implemented to counter threats to specific information systems assets
    • GA1:
    • GA5:
  3. Describe the ethical and legal issues with respect to control and security of information
    • GA3:
  4. Apply risk analysis techniques to determine the controls and countermeasures
    • GA1:
    • GA5:
  5. Develop security plans and security strategies for information systems.
    • GA1:
    • GA5:

Prescribed texts

  • Stallings, W & Brown, L , 2015, Computer Security Principles and Practice, 3rd edn, Pearson International (Global) Edition, Pearson Education Inc, USA. ISBN: 9781292066172.
Prescribed texts may change in future teaching periods.