CONTACT CSU

ITC359 Computer and Network Security (8)

CSU Discipline Area: Computing (COMPU)

Duration: One session

Abstract:

This subject provides students with a detailed introduction to security defensive technology including cryptography, firewalls, and intrustion detection systems, and how these technologies are used to achieve computer and network security goals. Students will also be introduced to the preliminary concepts related to cloud computing security.

+ Subject Availability Modes and Locations

Session 1
Internal CSU Study Centre Melbourne
Internal CSU Study Centre Sydney
Session 2
Internal Albury-Wodonga
Distance Bathurst

Continuing students should consult the SAL for current offering details: ITC359

Where differences exist between the Handbook and the SAL, the SAL should be taken as containing the correct subject offering details.

Assumed Knowledge:

ITC161 and ITC242

Objectives:

Upon successful completion of this subject, students should:

• be able to explain basic security terminology
• be able to describe that various generic threats to which computing systems and networks are prone
• be able to describe the concept of cryptography
• be able to describe the differences between symmetric and asymmetric cryptography
• be able to describe the application of a selection of cryptographic systems
• be able to describe the use of electronic signatures
• be able to describe a selection of virtual private networking standards
• be able to describe wired and wireless LAN (Local Area Network) security standards
• be able to explain basic access control terminology
• be able to describe the different methods and tools used for access control
• be able to compare and contrast firewall technologies, including stateless and stateful firewalls
• be able to identify a firewall architecture
• be able to compare and contrast intrusion detection systems with intrusion prevention systems
• be able to discuss factors that relate to host and data security including vulnerabilities and patches and data protection mechanisms
• be able to discuss factors that relate to host and data security including securing email, VoIP (Voice over Internet Protocol), and TCP/IP (Transport Control Protocol/ Internet Protocol) supervisory applications
• be able to discuss the preliminary concepts of cloud computing security
 

Syllabus:

The subject will cover the following topics:

• The Threat Environment
• Networking Concepts
• Elements of Cryptography
• Cryptographic Standards
• Access Control
• Firewalls
• Host and Data Security
• Application Security
• Cloud computing security

Back

The information contained in the 2013 CSU Handbook was accurate at the date of publication: 24 April 2013. The University reserves the right to vary the information at any time without notice.