Course Title: Security in Computing and Information Technology

Part A: Course Overview

Course Title: Security in Computing and Information Technology

Credit Points: 12.00


Terms

Course Code

Campus

Career

School

Learning Mode

Teaching Period(s)

COSC2536

City Campus

Undergraduate

140H Computer Science & Information Technology

Face-to-Face

Sem 2 2011,
Sem 1 2012,
Sem 2 2012,
Sem 1 2013,
Sem 2 2013,
Sem 1 2014,
Sem 2 2014,
Sem 2 2015,
Sem 1 2016,
Sem 2 2016

COSC2536

City Campus

Undergraduate

171H School of Science

Face-to-Face

Sem 1 2017,
Sem 2 2017

COSC2537

City Campus

Postgraduate

140H Computer Science & Information Technology

Face-to-Face

Sem 2 2011,
Sem 1 2012,
Sem 2 2012,
Sem 1 2013,
Sem 2 2013,
Sem 1 2014,
Sem 2 2014,
Sem 2 2015,
Sem 1 2016,
Sem 2 2016

COSC2537

City Campus

Postgraduate

171H School of Science

Face-to-Face

Sem 1 2017,
Sem 2 2017

COSC2539

RMIT University Vietnam

Undergraduate

140H Computer Science & Information Technology

Face-to-Face

Viet2 2011,
Viet1 2012,
Viet3 2012,
Viet2 2013,
Viet1 2014,
Viet3 2014,
Viet2 2015,
Viet1 2016,
Viet3 2016

COSC2539

RMIT University Vietnam

Undergraduate

171H School of Science

Face-to-Face

Viet2 2017

Course Coordinator: Assoc Prof Peter Bertok

Course Coordinator Phone: +61 3 9925 1851

Course Coordinator Email: peter.bertok@rmit.edu.au

Course Coordinator Location: City campus, Building 14

Course Coordinator Availability: by appointment


Pre-requisite Courses and Assumed Knowledge and Capabilities

Enforced Prerequisite: Data Communication and Net-centric Computing OR Web Servers and Web Technology

You may not enrol in this course unless one of these courses is explicitly listed in your enrolment program summary.

Note it is a condition of enrolment at RMIT that you accept responsibility for ensuring that you have completed the prerequisite/s and agree to concurrently enrol in co-requisite courses before enrolling in a course.

For your information the RMIT Course Requisites policy can be found at Course requisites – 7.29.1.6: http://www.rmit.edu.au/browse;ID=twx09y07zi1c


Course Description

Security has become a focal area in IT; it has grown and evolved significantly in recent years and different areas of specialisation have emerged.

This course gives an introduction to technical aspects of security for future IT professionals, and presents the foundations. It looks at the different security mechanisms used in various areas of computing, including operating systems, databases and web-based applications.

For computer systems that are used and relied upon in many areas of life, security has become an important aspect; availability and correct operation are essential. IT professionals working in the field need to be well acquainted with the security features of the tools and applications they use and produce. Protection of data regardless of the information they contain is a critical task, and requires expertise.


Objectives/Learning Outcomes/Capability Development

This course contributes to the following program learning outcomes in BP094 Bachelor of Computer Science; BP096 Bachelor of Software Engineering and BP162 Bachelor of Information Technology:

Program Learning Outcomes

This course contributes to the following program learning outcomes:

  • Enabling Knowledge:

You will gain skills as you apply knowledge effectively in diverse contexts.

  • Critical Analysis:

You will learn to accurately and objectively examine and consider computer science and information technology (IT) topics, evidence, or situations, in particular to:

-- analyse and model requirements and constraints for the purpose of designing and implementing software artefacts and IT systems

-- evaluate and compare designs of software artefacts and IT systems on the basis of organisational and user requirements.

  • Responsibility:

You will be required to accept responsibility for your own learning and make informed decisions about judging and adopting appropriate behaviour in professional and social situations. This includes accepting the responsibility for independent life-long learning. Specifically, you will learn to: effectively apply relevant standards, ethical considerations, and an understanding of legal and privacy issues to designing software applications and IT systems.


Course Learning Outcomes

Upon successful completion of this course you should be able to:

1. explain the functioning of security services in computing environments and the security issues in mobile computing.
2. discuss the types and attack strategies of malware.
3. describe basic system security mechanisms, such as those used in operating systems, file systems and computer networks.
4. analyse the overarching importance of IT security in areas such as networking, databases, operating systems, and web systems.
5. apply privacy principles in basic practical settings in IT environments.
6. analyse and evaluate the security of computing and IT systems on a practical level and privacy related issues in computing.


Overview of Learning Activities

This course is delivered in on-campus mode but aims to provide multiple modes of delivery with course materials available electronically wherever possible. Each topic (in standard on-campus mode) consists of lectures and supervised tutorial and laboratory work.

You will examine and analyse program constructs and structures and their relevance to security.

The learning activities included in this course are:

  • key concepts will be explained in lectures, classes or online, where course material will be presented and the subject matter will be illustrated with demonstrations and examples
  • tutorials and/or labs and/or group discussions (including online forums) focused on practical work and problem solving will provide practice in the application of principles and procedures, allow exploration of concepts with teaching staff and other students
  • assignment work requires an integrated understanding of the subject matter with the application of theory to practice
  • private study, working through the course as presented in classes and learning materials, and gaining practice at analysing conceptual and technical issues related to security and privacy.

A total of 120 hours of study is expected during this course, comprising:

Teacher-directed hours (48 hours): lectures, tutorials and laboratory sessions. Each week there will be 2 hours of lecture and tutorial plus 2 hours of computer laboratory work. You are encouraged to participate during lectures through asking questions, commenting on the lecture material based on your own experiences and through presenting solutions to written exercises. The tutorial / laboratory sessions will introduce you to the tools necessary to undertake the assignment work.

Student-directed hours (72 hours): You are expected to be self-directed, studying independently outside class.


Overview of Learning Resources

You will make extensive use of computer laboratories and relevant software provided by the School. You will be able to access course information and learning materials through myRMIT and may be provided with additional materials. Lists of relevant reference texts, resources in the library and freely accessible Internet sites will be provided.

Use the RMIT Bookshop textbook list search page to find any recommended textbook(s).

For extra support with study organisation, assignment planning or learning skills advice you may wish to contact the Study and Learning Centre http://www.rmit.edu.au/studyandlearningcentre


Overview of Assessment

The assessment for this course comprises class quizzes, computer laboratory practices, a written assignment, a mid-semester test and a formal written end-of- semester examination. The lab practices and assignment involve implementation of cloud security techniques.

Note: This course has no hurdle requirements.

Assessment tasks

Assessment Task 1: Webtests
Weblearn tests provide early and continuous feedback to help you learn and remember key points.
Weighting 15%
This assessment task supports CLOs 2 - 6

Assessment Task 2: Written Assignment
Weighting 35%
This assessment task supports CLOs 1 – 6

Assessment 3: End-of- Semester Examination
Weighting 50%
This assessment supports CLOs 1 - 6

Please note that postgraduate students are expected to demonstrate deeper knowledge and higher level application of knowledge and skills than undergraduate students.