CONTACT CSU

ITC529 Security Policy Foundations (8)

CSU Discipline Area: Computing (COMPU)

Duration: One session

Abstract:

This subject provides a broad overview of information security concepts, with an emphasis on combating security threats to operating systems, computer programs, and networked systems. Students will also study foundational security policies that stipulate requirements about integrity, confidentiality and availability. Techniques for implementing these policies are also investigated, including memory management techniques, access control mechanisms, user authentication, and networking tools such as firewalls and intrusion detection systems.

+ Subject Availability Modes and Locations

Session 2
Internal CSU Study Centre Melbourne
Distance Wagga Wagga

Continuing students should consult the SAL for current offering details: ITC529

Where differences exist between the Handbook and the SAL, the SAL should be taken as containing the correct subject offering details.

Enrolment restrictions:

Available only to students in:
Graduate Certificate in Information Technology
Graduate Diploma of Information Technology
Master of Information Technology

Not available to students who have completed ITC595 Information Security

Objectives:

Upon successful completion of this subject, students should:

Syllabus:

The subject will cover the following topics:

Back

The information contained in the 2013 CSU Handbook was accurate at the date of publication: 24 April 2013. The University reserves the right to vary the information at any time without notice.