Cyber-Security - ZEIT8104
Faculty: UNSW Canberra at ADFA
School: School of Engineering & Information Technology @ UNSW Canberra at ADFA
Course Outline: https://gateway.unsw.adfa.edu.au/isas/current_students/outlines/index.html
Campus: UNSW Canberra at ADFA
Career: Postgraduate
Units of Credit: 6
EFTSL: 0.12500 (more info)
Indicative Contact Hours per Week: 3
Enrolment Requirements:
Restricted to students enrolled in Graduate Diploma or Masters programs.
CSS Contribution Charge: 2 (more info)
Tuition Fee: See Tuition Fee Schedule
Further Information: See Class Timetable
Description
This course aims to provide a solid understanding of the theory and practice used to manage information security on computer systems and networks. In more detail, topics include: an overview of computer and communications security, risk assessment, human factors, identification and authentication, access controls, malicious software, software security, O/S security, trusted computer systems, network attacks and defences, firewalls, intrusion detection and prevention, database security, legal and ethical issues.
Learning Outcomes
1. Have a broad understanding of the theory and
practice used to maintain security on computer
systems and networks; of the need for risk
assessment and security management; of the
technological bases for secure systems; and of issues
in system and network security.
2. Be able to perform a simple risk assessment for
some organisation; utilise some of the approaches to
securing computer software and systems; to perform
simple reviews of network security, and to select and
design an appropriate firewall configuration.
3. Appreciate that people are always a key security
issue; and understand some of the relevant
personnel, legal and ethical issues raised.
practice used to maintain security on computer
systems and networks; of the need for risk
assessment and security management; of the
technological bases for secure systems; and of issues
in system and network security.
2. Be able to perform a simple risk assessment for
some organisation; utilise some of the approaches to
securing computer software and systems; to perform
simple reviews of network security, and to select and
design an appropriate firewall configuration.
3. Appreciate that people are always a key security
issue; and understand some of the relevant
personnel, legal and ethical issues raised.
Delivery Mode
Distance and Intensive Distance Mode
Topics
- Introduction to Cyber Security
- Security Risk Analysis and Response
- Human Factors
- User Authentication and Access Control
- Malicious Software
- Software Security and Buffer Overflow
- Operating Systems Security
- Trusted Computer Systems
- Network Attacks and Firewalls
- Intrusion Detection and Prevention
- Database Security
- Legal and Ethical Issues
Assessment
Practical Assignments 50%
Reading Project 25%
Take home Examination 25%
Reading Project 25%
Take home Examination 25%
Course Texts/Software
Prescribed texts:
William Stallings, Lawrie Brown, "Computer
Security: Principles and Practice", 2/e, Pearson /
Prentice Hall 2012. Support material is available:
http://williamstallings.com/ComputerSecurity/
Recommended Texts:
Nil
Software:
Nil
William Stallings, Lawrie Brown, "Computer
Security: Principles and Practice", 2/e, Pearson /
Prentice Hall 2012. Support material is available:
http://williamstallings.com/ComputerSecurity/
Recommended Texts:
Nil
Software:
Nil
Resources
Resources for this course are primarily provided to you
electronically through the UNSW Moodle server and
associated course resource disk image, and include:
• lecture notes and slides
• audio recordings of lectures past & current
• assessment details and instructions
• useful program links for you to install and use
• additional background resource material
• links to web and other resources
• model answers for exercises and projects.
electronically through the UNSW Moodle server and
associated course resource disk image, and include:
• lecture notes and slides
• audio recordings of lectures past & current
• assessment details and instructions
• useful program links for you to install and use
• additional background resource material
• links to web and other resources
• model answers for exercises and projects.