|China - Guangxi UST||N/A||Session 1|
|Online||Session 1||Session 1|
|Papua New Guinea - IBS Enga||N/A||Session 1|
|Papua New Guinea - IBS Port Moresby||N/A||Session 1|
Covers the various controls which can be implemented in information systems to guard against both intentional and unintentional threats. Students will examine techniques by which combinations of controls can be jointly implemented to provide effective countermeasures against threats. Students will apply risk analysis techniques to the development of security plans and security strategies.
Topic 1: Overview & fundamental concepts of computer security.
Topic 2: Cryptography
Topic 3: IT security risk assessment
Topic 4: IT security planning
Topic 5: Authentication
Topic 6: Access control & security models
Topic 7: Network security 1: malicious software
Topic 8: Network security 2: denial of service
Topic 9: Network security 3: intrusion detection & intrusion prevention
Topic 10: Human factors in security management & legal & ethical considerations
Topic 11: Physical & infrastructure security
Topic 12: Internet security
Unit Learning Outcomes express learning achievement in terms of what a student should know, understand and be able to do on completion of a unit. These outcomes are aligned with the graduate attributes. The unit learning outcomes and graduate attributes are also the basis of evaluating prior learning.
Learning outcomes and graduate attributes
|On completion of this unit, students should be able to:||GA1||GA2||GA3||GA4||GA5||GA6||GA7|
|1||Analyse information system and business context to counter both intentional and unintentional threats||Intellectual rigour||Lifelong learning|
|2||Choose controls which can be implemented to counter threats to specific information systems assets||Intellectual rigour||Lifelong learning|
|3||Describe the ethical and legal issues with respect to control and security of information||Ethical practice|
|4||Apply risk analysis techniques to determine the controls and countermeasures||Intellectual rigour||Lifelong learning|
|5||Develop security plans and security strategies for information systems.||Intellectual rigour||Lifelong learning|
- Stallings, W & Brown, L , 2015, Computer Security Principles and Practice, 3rd edn, Pearson International (Global) Edition, Pearson Education Inc, USA. ISBN: 9781292066172.
Teaching and assessment
China - Guangxi UST
|Exam: closed book||40%|
Papua New Guinea - IBS Enga
Papua New Guinea - IBS Port Moresby
Commonwealth Supported courses
For information regarding Student Contribution Amounts please visit the Student Contribution Amounts.
Commencing 2018 Commonwealth Supported only. Student contribution band: 2
Please check the international course and fee list to determine the relevant fees.