ITC593 Network Security and Cryptography (8)

ITC593 provides the practical knowledge and skills needed to analyse and work with network security protocols and standards, along with an in-depth introduction to the field of cryptography. The subject explores how contemporary encryption algorithms, digital signatures and cryptographic hash functions are used to implement various security goals, such as authentication, confidentiality and integrity. It also includes a comprehensive coverage of emerging security trends in modern IT infrastructure.

Availability

Session 2 (60)
On Campus
CSU Study Centre Melbourne
Online
Wagga Wagga Campus
Session 3 (90)
Online
Wagga Wagga Campus

Continuing students should consult the SAL for current offering details: ITC593. Where differences exist between the Handbook and the SAL, the SAL should be taken as containing the correct subject offering details.

Subject Information

Grading System

HD/FL

Duration

One session

School

School of Computing and Mathematics

Enrolment Restrictions

 Only available to postgraduate students.

Learning Outcomes

Upon successful completion of this subject, students should:
  • be able to identify and explain the various digital threats to IT networks and computing devices;
  • be able to analyse cryptographic algorithms, both symmetrical and asymmetrical, and explain how they are used to improve network security;
  • be able to compare and contrast the features of various authentication protocols;
  • be able to design security solutions using existing authentication protocols;
  • be able to effectively communicate and justify why a Public Key Infrastructure (PKI) is an important component in a network security architecture;
  • be able to investigate and evaluate the current and emerging trends in cryptography and network security; and
  • be able to propose mitigating techniques against cryptographic and network security threats.

Syllabus

This subject will cover the following topics:
  • Introduction to computer and network security.
  • Cryptography and its applications in network security.
  • Secret key (symmetric) algorithms.
  • Public key (asymmetric) algorithms.
  • Modes of operation.
  • RSA algorithm;
  • Authentication systems.
  • TLS and IP security
  • User authentication & Kerberos.
  • Key Management & Public key infrastructure (PKI).
  • Emerging trends and challenges of network security.

Indicative Assessment

The following table summarises the assessment tasks for the online offering of ITC593 in Session 3 2019. Please note this is a guide only. Assessment tasks are regularly updated and can also differ to suit the mode of study (online or on campus).

Item Number
Title
Value %
1
Online quizzes
20
2
Short answer questions and report
15
3
Research report
15
4
Final exam
50

The information contained in the CSU Handbook was accurate at the date of publication: July 2020. The University reserves the right to vary the information at any time without notice.

Back