ITC529 Security Policy Foundations (8)
CSU Discipline Area: Computing (COMPU)
Duration: One session
Abstract:
This subject provides a broad overview of information security concepts, with an emphasis on combating security threats to operating systems, computer programs, and networked systems. Students will also study foundational security policies that stipulate requirements about integrity, confidentiality and availability. Techniques for implementing these policies are also investigated, including memory management techniques, access control mechanisms, user authentication, and networking tools such as firewalls and intrusion detection systems.
+ Subject Availability Modes and Locations
| Session 2 | |
|---|---|
| Internal | CSU Study Centre Melbourne |
| Distance | Wagga Wagga |
Continuing students should consult the SAL for current offering details: ITC529
Where differences exist between the Handbook and the SAL, the SAL should be taken as containing the correct subject offering details.
Enrolment restrictions:
Available only to students in:
Graduate Certificate in Information Technology
Graduate Diploma of Information Technology
Master of Information Technology
Not available to students who have completed ITC595 Information Security
Objectives:
Upon successful completion of this subject, students should:
- be able to justify the goals of computer security;
- be able to explain the fundamental concepts of cryptography;
- be able to explain how a computer virus can infect an executable program and avoid detection;
- be able to evaluate the various classes of programming errors that may affect the security of a computer program;
- be able to analyse the application of various program controls to mitigate threats;
- be able to compare and contrast the various file and memory protection mechanisms in general purpose operating systems;
- be able to explain the principles and techniques of controlled access to computer system objects;
- be able to compare and contrast a selection of foundational security policies that deal with integrity and confidentiality;
- be able to apply the Bell La Padula, Clark-Wilson and Chinese Wall security models to a given scenario;
- be able to recognise the main features of trusted operating system design;
- be able to describe key issues involved in user authentication;
- be able to discuss various threats to networked computers, and techniques used to mitigate these threats.
Syllabus:
The subject will cover the following topics:
- Overview of computer security
- Introduction to cryptography
- Malicious code
- Operating systems security
- Access control theory
- Military security policy and Bell-La Padula
- Clark-Wilson
- Chinese Wall
- Trusted operating systems
- User authentication
- Networking threats
- Networking controls
The information contained in the 2013 CSU Handbook was accurate at the date of publication: 24 April 2013. The University reserves the right to vary the information at any time without notice.
