ITC567 Principles of Information Security (8)
CSU Discipline Area: Computing (COMPU)
Duration: One session
Abstract:
ITC567 covers both the managerial and technical aspects of information security in a real world context. Students gain an overview of the threats to information systems, and how these threats are mitigated through a combination of policies, procedures and technical tools. The legal responsibilities of using information systems are also considered.
+ Subject Availability Modes and Locations
| Session 1 | |
|---|---|
| Internal | CSU Study Centre Sydney | Session 2 |
| Internal | CSU Study Centre Melbourne |
| Distance | Wagga Wagga | Session 3 |
| Internal | CSU Study Centre Melbourne |
| Internal | CSU Study Centre Sydney |
Continuing students should consult the SAL for current offering details: ITC567
Where differences exist between the Handbook and the SAL, the SAL should be taken as containing the correct subject offering details.
Enrolment restrictions:
Available only to students in: Master of Information Technology Master of Information Systems
Objectives:
Upon successful completion of this subject, students should:
- be able to discuss the various threats to information systems;
- be able to identify major laws that relate to information security in a variety of situations;
- be able to explain the importance of security policies in the corporate environment and to distinguish between different types of policy;
- be able to discuss the basic approach to security risk analysis;
- be able to discuss fundamental issues surrounding privacy and data protection;
- be able to distinguish between various attack methods used by computer criminals;
- be able to apply the basic rules of firewall configuration;
- be able to explain various techniques used to achieve host, application, and network security; and
- be able to discuss incident and disaster response techniques
Syllabus:
The subject will cover the following topics:
- Introduction to information security - Digital threats - Security management - Security policies - Secure practices - Access control and site security - Network attack methods - Firewalls - Host and application security - Incident and disaster response - Electronic records management - Privacy and data protection
The information contained in the 2013 CSU Handbook was accurate at the date of publication: 24 April 2013. The University reserves the right to vary the information at any time without notice.
