Year
2021Credit points
10Campus offering
No unit offerings are currently available for this unit.Prerequisites
Nil
Incompatible
ITEC326 Information Systems Security
Unit rationale, description and aim
Cyber security is the practice of protecting networks, computer systems, and data from malicious attacks. With the increasing threats of data breach and leaks in our interconnected world, fintech companies, hospitals, government agencies, and every other sector are investing in cybersecurity infrastructure to protect their data and consumers from malicious attacks. However, there is a global shortage of cyber security experts and this number is growing every year. This unit is designed to help students develop a deeper understanding of modern information and cyber security challenges, mitigation techniques and tools.
The unit demonstrates the basic cyber security concepts, security tools and the common architectures used as industry standards. Students will learn how to defend against cyber threats and attacks and study existing techniques for managing security issues and maintaining the working environment.
The unit also covers ethical and legal issues in cyberspace to understand how cyber security affects legal compliance and solidarity in communities and society. The aim of this unit is to equip students with some background knowledge in cyber security, which scaffolds an advanced unit in network security.
Learning outcomes
To successfully complete this unit you will be able to demonstrate you have achieved the learning outcomes (LO) detailed in the below table.
Each outcome is informed by a number of graduate capabilities (GC) to ensure your work in this, and every unit, is part of a larger goal of graduating from ACU with the attributes of insight, empathy, imagination and impact.
Explore the graduate capabilities.
On successful completion of this unit, students should be able to:
LO1 - identify vulnerabilities and potential security threats to information systems and analyse their consequences in real world scenarios (GA4, GA5).
LO2 - demonstrate basic knowledge and understanding of cyber security concepts and investigate how cyber security affects legal compliance and solidarity in communities and society (GA2, GA5).
LO3 - evaluate the level of risks in an IT system using standard security models and prescribe appropriate countermeasures (GA5, GA8).
LO4 - apply knowledge and skills in designing efficient security solutions to ensure common security goals (GA5, GA10).
Graduate attributes
GA2 - recognise their responsibility to the common good, the environment and society
GA4 - think critically and reflectively
GA5 - demonstrate values, knowledge, skills and attitudes appropriate to the discipline and/or profession
GA8 - locate, organise, analyse, synthesise and evaluate information
GA10 - utilise information and communication and other relevant technologies effectively.
Content
Topics will include:
- Fundamental issues in cyber security
- Physical security
- Software security: intruder, malware
- Basic cryptography
- Risk assessment and management
- Hash function and digital signature
- Web security
- Database security
- Security tools and countermeasures
- Mobile devices and IoT security
- Legal and ethical issues
- Social impact of cybersecurity breaches
Learning and teaching strategy and rationale
This unit is offered in different modes. These are: “Attendance” mode, “Blended” mode and “Online” mode. This unit is offered in three modes to cater for the learning needs and preferences of a range of participants and maximise effective participation for isolated and/or marginalised groups.
Attendance Mode
In a weekly attendance mode, students will require face-to-face attendance in specific physical location/s. Students will have face-to-face interactions with lecturer(s) to further their achievement of the learning outcomes. This unit is structured with required upfront preparation before workshops, most students report that they spend an average of one hour preparing before the workshop and one or more hours after the workshop practicing and revising what was covered. The online learning platforms used in this unit provide multiple forms of preparatory and practice opportunities for you to prepare and revise.
Blended Mode
In a blended mode, students will require face-to-face attendance in blocks of time determined by the School. Students will have face-to-face interactions with lecturer(s) to further their achievement of the learning outcomes. This unit is structured with required upfront preparation before workshops. The online learning platforms used in this unit provide multiple forms of preparatory and practice opportunities for you to prepare and revise.
Online Mode
This unit uses an active learning approach to support students in the exploration of the essential knowledge associated with working with technology. Students can explore the essential knowledge underpinning technological advances and develop knowledge in a series of online interactive lessons and modules. Students are given the opportunity to attend facilitated synchronous online seminar classes with other students and participate in the construction and synthesis of knowledge, while developing their knowledge of working with technology. Students are required to participate in a series of online interactive workshops which include activities, knowledge checks, discussion and interactive sessions. This approach allows flexibility for students and facilitates learning and participation for students with a preference for virtual learning.
Students should anticipate undertaking 150 hours of study for this unit, including class attendance, readings, online forum participation and assessment preparation.
Assessment strategy and rationale
A range of assessment procedures will be used to meet the unit learning outcomes and develop graduate attributes consistent with University assessment requirements. The first assessment item includes a number of weekly labs designed to apply theoretical knowledge in a lab environment. The purpose of this item is to give students the opportunity of gaining essential knowledge on fundamental concepts of IT. The second assessment item is a scientific report, where students will assess risk factors of an IT system in an organisation and recommend appropriate countermeasures. The purpose of this assessment is to assess students’ critical and analytical ability to delve into complex concepts about cyber security through reflection and collaboration. The final assessment is an open book exam, where students will study several case studies, critically analyse them and answer a number of open-ended questions. The purpose of this assessment is to test students’ ability to apply their knowledge and skills in solving problems
The assessments for this unit are designed to demonstrate the achievement of each learning outcome. To pass this unit, students are required to:
- obtain an overall mark of at least 50%
- attempt all three assessment items
Overview of assessments
Brief Description of Kind and Purpose of Assessment Tasks | Weighting | Learning Outcomes | Graduate Attributes |
---|---|---|---|
Assessment Task 1: Lab Assessments This assessment consists of a series of weekly lab exercises where students are required to analyse different cybersecurity threats, breaches and apply their knowledge to countermeasure those threats/breaches. The feedback from this assessment will help students to understand security threats and vulnerabilities and identify appropriate security solutions. Submission Type: Individual Assessment Method: Lab Practical task Artefact: Source Code/Lab report | 20% | LO1, LO4 | GA4, GA5 |
Task 2: Report on Risk Analysis Students are expected to write a report reflecting their critical analysis on potential security threats and their consequences for a cyber physical system. The purpose of this assessment is to assess the students’ critical and analytical ability to delve into complex concepts about cyber security through reflection and collaboration. Submission Type: Individual Assessment Method: Scientific Report Artefact: Written report (2500 words) | 30% | LO3 | GA5, GA8 |
Assessment Task 3: Open Book Exam This assessment task tests the students’ grasp of both theoretical and practical aspects of the unit. Students will study several case studies, critically analyse them and answer a number of open-ended questions. They also have to use different security tools to investigate the given scenarios and recommend security solutions to safeguard physical and digital resources of an organisation. Submission Type: Individual Assessment Method: Exam Artefact: Answer Script | 50% | LO1, LO2, LO4 | GA2, GA4, GA5, GA10 |
Representative texts and references
Stallings W 2017, Cryptography & Network Security: Principles and Practices, 7th edn, Pearson US
Stallings W & Brown L, 2018, Computer Security: Principle and Practices, 4th Edn, Pearson US.
Charles J. Brooks, Philip Craig, Donald Short, Cybersecurity Essentials, SYBEX, 2017.
Anderson, R 2020, Security Engineering: A Guide to Building Dependable Distributed Systems, 3rd edn, Wiley.
Pfleeger C & Pfleeger S & Margulies J 2015, Security in Computing, 5th edn, Prentice Hall, New Jersey.
Whitman, M & Mattord, H 2016, Principles of Information Security, 5th edn, Cengage, Boston.