CONTACT CSU

ITC595 Information Security (8)

Abstract

This subject provides a broad overview of information security concepts, with an emphasis on combating security threats to operating systems, computer programs, databases and networked systems. Students will also study foundational security policies that stipulate requirements about integrity, confidentiality and availability. Techniques for implementing these policies are also investigated, including memory management techniques, access control mechanisms, user authentication, and networking tools.

+ Subject Availability Modes and Location

Session 1
OnlineWagga Wagga Campus
On CampusCSU Study Centre Melbourne
On CampusCSU Study Centre Sydney
Session 2
OnlineWagga Wagga Campus
On CampusCSU Study Centre Melbourne
On CampusCSU Study Centre Sydney
Continuing students should consult the SAL for current offering details: ITC595
Where differences exist between the Handbook and the SAL, the SAL should be taken as containing the correct subject offering details.

Subject information

Duration Grading System School:
One sessionHD/FLSchool of Computing and Mathematics

Enrolment restrictions

Available only to students in:
Graduate Certificate in Information Systems Security – core subject
Graduate Certificate in Information Technology – restricted elective
Graduate Diploma in Information Technology – restricted elective
Master of Information Technology – restricted elective
Master of Information Systems Security – core subject Not available to students who have completed ITC529, ITC567  
Incompatible subject(s)
ITC529 ITC567

Learning Outcomes

Upon successful completion of this subject, students should:
  • be able to justify security goals and the importance of maintaining the secure computing environment against digital threats;
  • be able to explain the fundamental concepts of cryptographic algorithms;
  • be able to examine malicious activities that may affect the security of a computer program and justify the choice of various controls to mitigate threats;
  • be able to compare and contrast the security mechanisms of a trusted operating system with those used in a general purpose operating system;
  • be able to investigate and justify the use of the access control mechanisms and user authentication processes;
  • be able to compare and contrast foundational security policies and models that deal with integrity and confidentiality.

Syllabus

The subject will cover the following topics:
  • Overview of computer security.
  • Introduction to cryptography.
  • Malicious code.
  • Operating systems security.
  • Access Control Theory.
  • Trusted operating systems.
  • User authentication.
  • Security policies and models.
  • Networking threats.
  • Networking controls.
  • Database and data security.

Back

The information contained in the 2017 CSU Handbook was accurate at the date of publication: 25 August 2017. The University reserves the right to vary the information at any time without notice.