UG Coursework Unit
Level of learning
Covers the various controls which can be implemented in information systems to guard against both intentional and unintentional threats. Students will examine techniques by which combinations of controls can be jointly implemented to provide effective countermeasures against threats. Students will apply risk analysis techniques to the development of security plans and security strategies.
Topic 1: Overview & fundamental concepts of computer security.
Topic 2: Cryptography
Topic 3: IT security risk assessment
Topic 4: IT security planning
Topic 5: Authentication
Topic 6: Access control & security models
Topic 7: Network security 1: malicious software
Topic 8: Network security 2: denial of service
Topic 9: Network security 3: intrusion detection & intrusion prevention
Topic 10: Human factors in security management & legal & ethical considerations
Topic 11: Physical & infrastructure security
Topic 12: Internet security
Unit Learning Outcomes express learning achievement in terms of what a student should know, understand and be able to do on completion of a unit. These outcomes are aligned with the graduate attributes. The unit learning outcomes and graduate attributes are also the basis of evaluating prior learning.
|On completion of this unit, students should be able to:||GA1||GA2||GA3||GA4||GA5||GA6||GA7|
|1||Analyse information system and business context to counter both intentional and unintentional threats|
|2||Choose controls which can be implemented to counter threats to specific information systems assets|
|3||Describe the ethical and legal issues with respect to control and security of information|
|4||Apply risk analysis techniques to determine the controls and countermeasures|
|5||Develop security plans and security strategies for information systems.|
On completion of this unit, students should be able to:
Analyse information system and business context to counter both intentional and unintentional threats
Choose controls which can be implemented to counter threats to specific information systems assets
Describe the ethical and legal issues with respect to control and security of information
Apply risk analysis techniques to determine the controls and countermeasures
Develop security plans and security strategies for information systems.
- Stallings, W & Brown, L , 2015, Computer Security Principles and Practice, 3rd edn, Pearson International (Global) Edition, Pearson Education Inc, USA. ISBN: 9781292066172.