ITC595 Information Security (8)

This subject provides a broad overview of information security concepts, with an emphasis on combating security threats to operating systems, computer programs, databases and networked systems. Students will also study foundational security policies that stipulate requirements about integrity, confidentiality and availability. Techniques for implementing these policies are also investigated, including memory management techniques, access control mechanisms, user authentication, and networking tools.

Availability

Session 1 (30)
On Campus
CSU Study Centre Brisbane
CSU Study Centre Melbourne
CSU Study Centre Sydney
Port Macquarie Campus
Online
Wagga Wagga Campus
Session 2 (60)
On Campus
CSU Study Centre Brisbane
CSU Study Centre Melbourne
CSU Study Centre Sydney
Online
Wagga Wagga Campus
Session 3 (90)
Online
Wagga Wagga Campus

Continuing students should consult the SAL for current offering details: ITC595. Where differences exist between the Handbook and the SAL, the SAL should be taken as containing the correct subject offering details.

Subject Information

Grading System

HD/FL

Duration

One session

School

School of Computing and Mathematics

Enrolment Restrictions

Only available to postgraduate students. Not available to students who have completed ITC529 or ITC567.

 

Incompatible Subjects

ITC529, ITC567

Learning Outcomes

Upon successful completion of this subject, students should:
  • be able to justify security goals and the importance of maintaining the secure computing environment against digital threats;
  • be able to explain the fundamental concepts of cryptographic algorithms;
  • be able to examine malicious activities that may affect the security of a computer program and justify the choice of various controls to mitigate threats;
  • be able to compare and contrast the security mechanisms of a trusted operating system with those used in a general purpose operating system;
  • be able to investigate and justify the use of the access control mechanisms and user authentication processes;
  • be able to compare and contrast foundational security policies and models that deal with integrity and confidentiality.

Syllabus

This subject will cover the following topics:
  • Overview of Information Security
  • Applied Cryptography
  • Authentication and Access Control
  • Types of Security Threats and Attacks
  • Operating System Security
  • Network Security
  • Database Security
  • Cloud Computing Security
  • Privacy
  • Emerging topics in Cyber and Information Security

Indicative Assessment

The following table summarises the assessment tasks for the online offering of ITC595 in Session 1 2019. Please note this is a guide only. Assessment tasks are regularly updated and can also differ to suit the mode of study (online or on campus).

Item Number
Title
Value %
1
Online quiz - 1
5
2
Security fundamentals
15
3
Research project (abstract)
5
4
Online quiz - 2
5
5
Research project (report)
20
6
Final exam
50

The information contained in the CSU Handbook was accurate at the date of publication: October 2020. The University reserves the right to vary the information at any time without notice.

Back