No offerings have been identified for this subject in 2017

JST350 Cyber Security: Terrorism, Crime and Warfare in the 21st Century (8)


This subject will introduce students to characteristics of cyber security and to cyber terrorism, cyber crime and cyber warfare. It will explore the concepts of information and technology and the impacts these are having on society and security. The subject will provide students with a typology of cyber security, and an overview of terminology and the common manifestations of the different types of attacks, tactics and strategies. Students will develop a critical knowledge of the actors, motivations, and consequences of different cyber security threats,  will critically consider and analyse the limitations of government and the private sector in responding and the vulnerabilities within the systems under threat.

+ Subject Availability Modes and Location

Continuing students should consult the SAL for current offering details prior to contacting their course coordinator: JST350
Where differences exist between the handbook and the SAL, the SAL should be taken as containing the correct subject offering details.

Subject information

Duration Grading System School:
One sessionHD/FLAustralian Graduate School of Policing and Security

Enrolment restrictions

Related subject(s)
GPM510 Paired Subject

Learning Outcomes

Upon successful completion of this subject, students should:
  • be able to explain the evolution of information, technology, and information technology and the impact that it has had on society and security
  • be able to successfully distinguish between the key types of cyber security threats, namely; cyber terrorism, cyber crime, and cyber warfare
  • demonstrate an understanding of the key attack types and the various methodologies, tactics, and strategies employed by cyber actors
  • demonstrate an understanding of the different actors, motivations and intended consequences of cyber threats and cyber attacks
  • articulate an understanding of government and private sector approaches to cyber security, identifying the varied approaches and the key challenges and constraints
  • identify and assess the key vulnerabilities and weaknesses that present opportunities to cyber adversaries


The subject will cover the following topics:
  • The History of Information, Technology, and Information Technology, and their impacts on society and security
  • A Typology of Cyber Security: cyber terrorism, cyber crime and cyber warfare
  • Cyber Attacks: Key attack tactics and strategies
  • Actors, Motivations, and Consequences: The who, why and so what of cyber security
  • Public and Private sector responses to cyber security issues: Challenges and constraints
  • Systemic Weaknesses and Vulnerabilities


The information contained in the 2017 CSU Handbook was accurate at the date of publication: 12 August 2016. The University reserves the right to vary the information at any time without notice.