ITC358 IT Security (8)

This subject provides a comprehensive overview of the fundamental information security issues and concepts. Students will be introduced to the security threat environment as well as the security defensive mechanisms including cryptography, firewalls, host and application hardening and data protection techniques. Practices related to Information and Communication Technology (ICT) security management are also investigated. Risk identification, security planning and implementation of effective policy and practices will be covered.

Availability

Session 1 (30)
On Campus
Bathurst Campus
CSU Study Centre Melbourne
CSU Study Centre Sydney
Wagga Wagga Campus
Online
Wagga Wagga Campus
Session 2 (60)
On Campus
CSU Study Centre Sydney

Continuing students should consult the SAL for current offering details: ITC358. Where differences exist between the Handbook and the SAL, the SAL should be taken as containing the correct subject offering details.

Subject Information

Grading System

HD/FL

Duration

One session

School

School of Computing and Mathematics

Assumed Knowledge

Background knowledge at the level of ITC212 or ITC242

Learning Outcomes

Upon successful completion of this subject, students should:
  • be able to explain fundamental information security concepts;
  • be able to discuss and debate some of the security implications of computer networks, including cryptography;
  • be able to compare and contrast firewall technologies;
  • be able to communicate factors that relate to host and data security including vulnerabilities and patches and data protection mechanisms;
  • be able to evaluate some of the key application security concepts and practices;
  • be able to explain and debate issues and concepts related to management of ICT security including security planning and policy development.

Syllabus

This subject will cover the following topics:
  • Introduction to information security.
  • Cryptography and network security fundamentals.
  • Firewalls.
  • Host hardening.
  • Data protection.
  • Application security.
  • Security planning and policy.
  • Incident and disaster recovery.

Indicative Assessment

The following table summarises the assessment tasks for the online offering of ITC358 in Session 1 2019. Please note this is a guide only. Assessment tasks are regularly updated and can also differ to suit the mode of study (online or on campus).

Item Number
Title
Value %
1
Online quiz
5
2
Essay questions
20
3
Research report
25
4
Final exam
50

The information contained in the CSU Handbook was accurate at the date of publication: October 2020. The University reserves the right to vary the information at any time without notice.

Back