CONTACT CSU

ITC567 Principles of Information Security (8)

CSU Discipline Area: Computing (COMPU)

Duration: One session

Abstract:

ITC567 covers both the managerial and technical aspects of information security in a real world context. Students gain an overview of the threats to information systems, and how these threats are mitigated through a combination of policies, procedures and technical tools. The legal responsibilities of using information systems are also considered.

+ Subject Availability Modes and Locations

Session 1
Internal CSU Study Centre Sydney
Session 2
Internal CSU Study Centre Melbourne
Distance Wagga Wagga
Session 3
Internal CSU Study Centre Melbourne
Internal CSU Study Centre Sydney

Continuing students should consult the SAL for current offering details: ITC567

Where differences exist between the Handbook and the SAL, the SAL should be taken as containing the correct subject offering details.

Enrolment restrictions:

Available only to students in: Master of Information Technology Master of Information Systems

Objectives:

Upon successful completion of this subject, students should:

- be able to discuss the various threats to information systems;
- be able to identify major laws that relate to information security in a variety of situations;
- be able to explain the importance of security policies in the corporate environment and to distinguish between different types of policy;
- be able to discuss the basic approach to security risk analysis;
- be able to discuss fundamental issues surrounding privacy and data protection;
- be able to distinguish between various attack methods used by computer criminals;
- be able to apply the basic rules of firewall configuration;
- be able to explain various techniques used to achieve host, application, and network security; and
- be able to discuss incident and disaster response techniques

Syllabus:

The subject will cover the following topics:

- Introduction to information security - Digital threats - Security management - Security policies - Secure practices - Access control and site security - Network attack methods - Firewalls - Host and application security - Incident and disaster response - Electronic records management - Privacy and data protection

Back

The information contained in the 2013 CSU Handbook was accurate at the date of publication: 24 April 2013. The University reserves the right to vary the information at any time without notice.