Course Title: Case Studies in Information Security
Part A: Course Overview
Course Title: Case Studies in Information Security
Credit Points: 12.00
145H Mathematical & Geospatial Sciences
|Sem 1 2006,
Sem 2 2006,
Sem 1 2007,
Sem 1 2008,
Sem 1 2009,
Sem 1 2010,
Sem 1 2011,
Sem 1 2012,
Sem 1 2013,
Sem 1 2014,
Sem 1 2015,
Sem 1 2016
171H School of Science
|Sem 1 2017|
Course Coordinator: Associate Professor Asha Rao
Course Coordinator Phone: +61 3 9925 1843
Course Coordinator Email: email@example.com
Pre-requisite Courses and Assumed Knowledge and Capabilities
In this course a wide variety of contemporary industry experts will present guest lectures on their experiences in the field of Information Security. Topics will range from technical and managerial to the legal aspects. Career development (with presentations from alumni) and building capability around information literacy are also addressed.
This course should enable you to:
• Apply the knowledge and skills obtained to study further concepts in Information Security;
• Communicate and interpret, in class and in assignments, ideas related to the principles of Information Security.
• Work in pairs or groups, allocate work and calculate comparable workloads and percentage allocations.
This course provides you with the opportunity to choose topics of particular interest for more in-depth examination, thereby complementing the broad coverage of information security topics in the course INTE1120 Introduction to Information Security.
Objectives/Learning Outcomes/Capability Development
This course will provide you with a link between the theoretical knowledge presented in INTE1120 Introduction to Information Security and case studies from the Information Security industry.
On completion of this course you should be able to:
1. Define and discuss the information security related concepts of risks and the challenges encountered in modern information security applications.
2. Identify professional careers or postgraduate research opportunities that exist in the field of information security.
3. Apply aspects of work practice and group dynamics theory relevant to the interdisciplinary and people-centred nature of Information Security.
4. Communicate both technical and non-technical material in a range of forms (written, oral, electronic, graphic) to a variety of audiences and recognise the difference between commenting on and copying information.
5. Explore the idea that in Information Security answers are not always known, and proposed solutions could give rise to new, equally complex problems.
6. Navigate through the language and other dimensions of the field of information security in order to expand your knowledge, skills and their application.
This course contributes to the following Program Learning Outcomes for MC159 Master of Applied Science (Information Security and Assurance)
International Orientation and Strategic Thinking
• Graduates will have a strategic and practical overview of the issues in information security and assurance.
Critical Analysis and Problem Solving
• Evaluate information security risks across diverse service settings including the Internet and WWW based commerce systems, high bandwidth digital communications and funds transfer services,
• Undertake professional careers or postgraduate research in information security or other IT related fields, acquiring the required information needed to identify real world solutions to real world information security problems.
• Graduates will have the ability to communicate both technical and non-technical material in a range of forms (written, electronic, graphic, oral) and to tailor the style and means of communication to different audiences.
• Graduates will exhibit an ability to appreciate the ethical considerations that inform judgments and decision making in academic and professional settings.
Self-Management, Teamwork and Leadership
• Graduates will possess the ability to work effectively within and potentially as a leader of an interdisciplinary team.
Overview of Learning Activities
A variety of planned student learning experiences will be used to cater for the learning outcomes envisaged for this course. This includes seminars, group discussions and laboratory based learning experiences.
A seminar format will be used to provide an overview of a specific aspect of the Information Security field. This will usually be led by an industry expert. Students will be directed to foundational, analytical and evidence-based readings about the practice of information security.
You will be involved in facilitated open discussions in the seminar context, enabling you and your classmates to draw on your own professional work and life experiences, facilitating interaction between those students with work experience and new graduates.
You will be required to choose a partner (or partners) and decide on an aspect of Information Security to further research. All teams will be required to schedule meetings, maintain meeting logs, allocate work among team members and finally arrive at a consensual percentage allocation of the final report.
2 to 3 hours of seminar/discussion sessions per week with industry experts.
Relevant topic material (as assigned by the speaker for the session) will be uploaded to Blackboard in the days prior to the session You can expect to spend between 6 to 8 hours per week on independent study and research of these assigned learning materials.
Overview of Learning Resources
You will be expected to expand on the subject matter provided. This will take the form of accessing various external and internal resources, such as the library and the Internet.
The Internet will be the most important source for academic, technical and white papers and you will be required to use this as a learning resource on a regular basis. In addition your classmates and the lecturer/speaker are also important learning resources as will be demonstrated in the facilitated discussions.
Blackboard: This course is supported online using Blackboard, which gives access to important announcements, a discussion forum, staff contact details, the teaching schedule, assessment timelines. You are advised to read your student EMS e-mail daily for important announcements. You should also visit the course Blackboard site at least once a day where you will find important announcements regarding the course and all key documents.
Overview of Assessment
Individual class participation in the seminars will form part of the assessment in this subject. There will also be assignments, which evaluate your ability to write a brief essay pertaining to the seminar content. Emphasis will be on evidence of creative thinking and communication of independent ideas. In teams you will undertake a project which will require further reading/research. Project reports and presentations will demonstrate your understanding of case study content.
☒This course has no hurdle requirements.
Continuous Assessment Task: Weekly Pop Quiz based on the material assigned for the week’s discussion session.
This assessment task supports CLOs 5 & 6
Assessment Task 2: Paraphrasing
This assessment task supports CLOs 4 & 5
Assessment Task 3: Mock Job Applications
This assessment task supports CLOs 2 & 4
Assessment Task 4: Short Essays
This assessment supports CLOs 1, 4, 5, 6
Assessment Task 5: Discussion paper
This assessment supports CLOs 1, 3, 4, 5, 6
Assessment Task 6: Presentation of Discussion paper
This assessment supports CLOs 1, 3 & 4
Assessment Task 7: Peer Review
This assessment supports CLOs 3 & 4