Abstract
This subject provides a broad overview of information security concepts, with an emphasis on combatting security threats to operating systems, computer programs, databases and networked systems. Students will also study cyber security professionalism and foundational security policies that stipulate requirements about integrity, confidentiality and availability. Techniques for implementing these policies … For more content click the Read More button below.
Syllabus
Overview of Information SecurityApplied CryptographyAuthentication and Access ControlTypes of Security Threats and AttacksOperating System SecurityNetwork SecurityDatabase SecurityCloud Computing SecurityPrivacyEmerging topics in Cyber and Information SecurityPrivacy and cyber security professionalism
Learning outcomes
Upon successful completion of this subject, students should:
1.
be able to justify security goals and the importance of maintaining the secure computing environment against digital threats;
2.
be able to explain the fundamental concepts of cryptographic algorithms;
3.
be able to examine malicious activities that may affect the security of a computer program and justify the choice of various controls to mitigate threats;
4.
be able to compare and contrast the security mechanisms of a trusted operating system with those used in a general purpose operating system;
5.
be able to investigate and justify the use of the access control mechanisms and user authentication processes;
6.
be able to compare and contrast foundational security policies and models that deal with integrity and confidentiality.; and
7.
be able to analyse privacy and security issues using a professional code of conduct such as the Australian Computer Society (ACS) Code of Conduct.
Enrolment restrictions
Only available to postgraduate students.