ITC359 Computer and Network Security (8)
CSU Discipline Area: Computing (COMPU)
Duration: One session
Abstract:
This subject provides students with a detailed introduction to security defensive technology including cryptography, firewalls, and intrustion detection systems, and how these technologies are used to achieve computer and network security goals. Students will also be introduced to the preliminary concepts related to cloud computing security.
+ Subject Availability Modes and Locations
| Session 1 | |
|---|---|
| Internal | CSU Study Centre Melbourne |
| Internal | CSU Study Centre Sydney | Session 2 |
| Internal | Albury-Wodonga |
| Distance | Bathurst |
Continuing students should consult the SAL for current offering details: ITC359
Where differences exist between the Handbook and the SAL, the SAL should be taken as containing the correct subject offering details.
Assumed Knowledge:
Objectives:
Upon successful completion of this subject, students should:
• be able to explain basic security terminology
• be able to describe that various generic threats to which computing systems and networks are prone
• be able to describe the concept of cryptography
• be able to describe the differences between symmetric and asymmetric cryptography
• be able to describe the application of a selection of cryptographic systems
• be able to describe the use of electronic signatures
• be able to describe a selection of virtual private networking standards
• be able to describe wired and wireless LAN (Local Area Network) security standards
• be able to explain basic access control terminology
• be able to describe the different methods and tools used for access control
• be able to compare and contrast firewall technologies, including stateless and stateful firewalls
• be able to identify a firewall architecture
• be able to compare and contrast intrusion detection systems with intrusion prevention systems
• be able to discuss factors that relate to host and data security including vulnerabilities and patches and data protection mechanisms
• be able to discuss factors that relate to host and data security including securing email, VoIP (Voice over Internet Protocol), and TCP/IP (Transport Control Protocol/ Internet Protocol) supervisory applications
• be able to discuss the preliminary concepts of cloud computing security
Syllabus:
The subject will cover the following topics:
• The Threat Environment
• Networking Concepts
• Elements of Cryptography
• Cryptographic Standards
• Access Control
• Firewalls
• Host and Data Security
• Application Security
• Cloud computing security
The information contained in the 2013 CSU Handbook was accurate at the date of publication: 24 April 2013. The University reserves the right to vary the information at any time without notice.
