Course Title: Case Studies in Cyber Security

Part A: Course Overview

Course Title: Case Studies in Cyber Security

Credit Points: 12.00

Terms

Course Code

Campus

Career

School

Learning Mode

Teaching Period(s)

INTE1122

City Campus

Postgraduate

145H Mathematical & Geospatial Sciences

Face-to-Face

Sem 1 2006,
Sem 2 2006,
Sem 1 2007,
Sem 1 2008,
Sem 1 2009,
Sem 1 2010,
Sem 1 2011,
Sem 1 2012,
Sem 1 2013,
Sem 1 2014,
Sem 1 2015,
Sem 1 2016

INTE1122

City Campus

Postgraduate

171H School of Science

Face-to-Face

Sem 1 2017,
Sem 1 2018

Course Coordinator: Joanne Hall

Course Coordinator Phone: +61 3 9925 2511

Course Coordinator Email: joanne.hall@rmit.edu.au

Course Coordinator Location: 008.09.014

Course Coordinator Availability: By Appointment


Pre-requisite Courses and Assumed Knowledge and Capabilities

None


Course Description

In this course a wide variety of contemporary industry experts will present guest lectures on their experiences in the field of Information Security. Topics will range from technical and managerial to the legal aspects. Career development (with presentations from alumni) and building capability around information literacy are also addressed. 
This course should enable you to:


• Apply the knowledge and skills obtained to study further concepts in Information Security;
• Communicate and interpret, in class and in assignments, ideas related to the principles of Information Security.
• Work in pairs or groups, allocate work and calculate comparable workloads and percentage allocations.


This course provides you with the opportunity to choose topics of particular interest for more in-depth examination, thereby complementing the broad coverage of information security topics in the course INTE1120 Introduction to Information Security.
 


Objectives/Learning Outcomes/Capability Development

This course will provide you with a link between the theoretical knowledge presented in INTE1120 Introduction to Information Security and case studies from the Information Security industry.


On completion of this course you should be able to:


1. Define and discuss the information security related concepts of risks and the challenges encountered in modern information security applications. 
2. Identify professional careers or postgraduate research opportunities that exist in the field of information security.
3. Apply aspects of work practice and group dynamics theory relevant to the interdisciplinary and people-centred nature of Information Security.
4.  Communicate both technical and non-technical material in a range of forms (written, oral, electronic, graphic) to a variety of audiences and recognise the difference between commenting on and copying information.
5. Explore the idea that in Information Security answers are not always known, and  proposed solutions could  give rise to new, equally complex problems.
6. Navigate through the language and other dimensions of the field of information security in order to expand your knowledge, skills and their application.
 


This course contributes to the following Program Learning Outcomes for MC159 Master of Applied Science (Information Security and Assurance)

International Orientation and Strategic Thinking

• Graduates will have a strategic and practical overview of the issues in information security and assurance.

Critical Analysis and Problem Solving

• Evaluate information security risks across diverse service settings including the Internet and WWW based commerce systems, high bandwidth digital communications and funds transfer services,
• Undertake professional careers or postgraduate research in information security or other IT related fields, acquiring the required information needed to identify real world solutions to real world information security problems.

Communication
• Graduates will have the ability to communicate both technical and non-technical material in a range of forms (written, electronic, graphic, oral) and to tailor the style and means of communication to different audiences.

Ethical Values
• Graduates will exhibit an ability to appreciate the ethical considerations that inform judgments and decision making in academic and professional settings.

Self-Management, Teamwork and Leadership
• Graduates will possess the ability to work effectively within and potentially as a leader of an interdisciplinary team.
 


Overview of Learning Activities

You will be expected to expand on the subject matter provided. This will take the form of accessing various external and internal resources, such as the library and the Internet.

 

The Internet will be the most important source for academic, technical and white papers and you will be required to use this as a learning resource on a regular basis. In addition your classmates and the lecturer/speaker are also important learning resources as will be demonstrated in the facilitated discussions.

 

Canvas: This course is supported online using Canvas, which gives access to important announcements, a discussion forum, staff contact details, the teaching schedule, assessment timelines. You are advised to read your student EMS e-mail daily for important announcements. You should also visit the course Canvas site at least once a day where you will find important announcements regarding the course and all key documents. 


Overview of Learning Resources

You will be expected to expand on the subject matter provided. This will take the form of accessing various external and internal resources, such as the library and the Internet.

The Internet will be the most important source for academic, technical and white papers and you will be required to use this as a learning resource on a regular basis. In addition your classmates and the lecturer/speaker are also important learning resources as will be demonstrated in the facilitated discussions.

Canvas: This course is supported online using Canvas, which gives access to important announcements, a discussion forum, staff contact details, the teaching schedule, assessment timelines. You are advised to read your student EMS e-mail daily for important announcements. You should also visit the course Canvas site at least once a day where you will find important announcements regarding the course and all key documents.
 


Overview of Assessment

Individual written assessments builds your skills across the semester, culminating a written exam. Emphasis will be on evidence of creative thinking and communication of independent ideas.

 

The Mock Job Application task will help prepare you for future job search.

 

In teams you will undertake a project which will require in depth reading/research of a specific aspect of cybersecuirty. Project reports and presentations will demonstrate your understanding of case study content.

 

This course has no hurdle requirements.

Assessment Tasks:

 

Assessment Task 1:  Paraphrasing 
Weighting 5%
This assessment task supports CLOs 4 & 6

 

Assessment Task 2: Mock Job Applications 
Weighting 10%
This assessment task supports CLOs  2 & 4

 

Assessment Task 3: Short Essay 
Weighting 10%  
This assessment supports CLOs 1, 4, 5, & 6

 

Assessment Task4: Discussion paper 
Weighting 40%  
This assessment supports CLOs 1, 3, 4, 5, & 6

 

Assessment Task5: Presentation of Discussion paper
Weighting 10%  
This assessment supports CLOs 1, 3 & 4

 

Assessment Task6: Peer Review 
Weighting 5%  
This assessment supports CLOs 3 & 4

 

Assesment Task 7: Written Examination

Weighting 20%

This assessment supports CLOs 1,4,5, & 6