Availabilities:
Unit Summary
Unit type
UG Coursework Unit
Credit points
12
AQF level
Level of learning
Advanced
Former School/College
Unit aim
Covers the various controls which can be implemented in information systems to guard against both intentional and unintentional threats. Students will examine techniques by which combinations of controls can be jointly implemented to provide effective countermeasures against threats. Students will apply risk analysis techniques to the development of security plans and security strategies.
Unit content
Topic 1 Overview & fundamental concepts of computer security.
Topic 2 Cryptography
Topic 3 IT security risk assessment
Topic 4 IT security planning
Topic 5 Authentication
Topic 6 Access control & security models
Topic 7 Network security 1: malicious software
Topic 8 Network security 2: denial of service
Topic 9 Network security 3: intrusion detection & intrusion prevention
Topic 10 Human factors in security management & legal & ethical considerations
Topic 11 Physical & infrastructure security
Topic 12 Internet security
Learning outcomes
Unit Learning Outcomes express learning achievement in terms of what a student should know, understand and be able to do on completion of a unit. These outcomes are aligned with the graduate attributes. The unit learning outcomes and graduate attributes are also the basis of evaluating prior learning.
On completion of this unit, students should be able to: | GA1 | GA2 | GA3 | GA4 | GA5 | GA6 | GA7 | |
---|---|---|---|---|---|---|---|---|
1 | Analyse information system and business context to counter both intentional and unintentional threats | |||||||
2 | Choose controls which can be implemented to counter threats to specific information systems assets | |||||||
3 | Describe the ethical and legal issues with respect to control and security of information | |||||||
4 | Apply risk analysis techniques to determine the controls and countermeasures | |||||||
5 | Develop security plans and security strategies for information systems. |
On completion of this unit, students should be able to:
-
Analyse information system and business context to counter both intentional and unintentional threats
- GA1:
- GA5:
-
Choose controls which can be implemented to counter threats to specific information systems assets
- GA1:
- GA5:
-
Describe the ethical and legal issues with respect to control and security of information
- GA3:
-
Apply risk analysis techniques to determine the controls and countermeasures
- GA1:
- GA5:
-
Develop security plans and security strategies for information systems.
- GA1:
- GA5:
Prescribed texts
- Stallings, W & Brown, L , 2015, Computer Security Principles and Practice, 3rd edn, Pearson International (Global) Edition, Pearson Education Inc, USA. ISBN: 9781292066172.