Course Title: Security in Computing and Information Technology

Part A: Course Overview

Course Title: Security in Computing and Information Technology

Credit Points: 12.00

Terms

Course Code

Campus

Career

School

Learning Mode

Teaching Period(s)

COSC2536

City Campus

Undergraduate

140H Computer Science & Information Technology

Face-to-Face

Sem 2 2011,
Sem 1 2012,
Sem 2 2012,
Sem 1 2013,
Sem 2 2013,
Sem 1 2014,
Sem 2 2014,
Sem 2 2015,
Sem 1 2016,
Sem 2 2016

COSC2536

City Campus

Undergraduate

171H School of Science

Face-to-Face

Sem 1 2017,
Sem 2 2017,
Sem 1 2018,
Sem 2 2018

COSC2537

City Campus

Postgraduate

140H Computer Science & Information Technology

Face-to-Face

Sem 2 2011,
Sem 1 2012,
Sem 2 2012,
Sem 1 2013,
Sem 2 2013,
Sem 1 2014,
Sem 2 2014,
Sem 2 2015,
Sem 1 2016,
Sem 2 2016

COSC2537

City Campus

Postgraduate

171H School of Science

Face-to-Face

Sem 1 2017,
Sem 2 2017,
Sem 1 2018

COSC2539

RMIT University Vietnam

Undergraduate

140H Computer Science & Information Technology

Face-to-Face

Viet2 2011,
Viet1 2012,
Viet3 2012,
Viet2 2013,
Viet1 2014,
Viet3 2014,
Viet2 2015,
Viet1 2016,
Viet3 2016

COSC2539

RMIT University Vietnam

Undergraduate

171H School of Science

Face-to-Face

Viet2 2017,
Viet1 2018

Course Coordinator: Assoc Prof Ibrahim Khalil

Course Coordinator Phone: +61 3 9925 2879

Course Coordinator Email: ibrahim.khalil@rmit.edu.au

Course Coordinator Location: City campus, 14.11.25

Course Coordinator Availability: by appointment


Pre-requisite Courses and Assumed Knowledge and Capabilities

None


Course Description

Security has become a focal area in IT; it has grown and evolved significantly in recent years and different areas of specialisation have emerged.

This course gives an introduction to technical aspects of security for future IT professionals, and presents the foundations. It looks at fundamental cryptographic and security mechanisms used in various areas of networked applications and computing, including operating systems, databases and web-based applications as well as modern privacy preserving systems and blockchains.

For computer systems that are used and relied upon in many areas of life, security has become an important aspect; availability and correct operation are essential. IT professionals working in the field need to be well acquainted with the security features of the tools and applications they use and produce. Protection of data regardless of the information they contain is a critical task, and requires expertise.


Objectives/Learning Outcomes/Capability Development

This course contributes to the following program learning outcomes in BP094 Bachelor of Computer Science; BP096 Bachelor of Software Engineering and BP162 Bachelor of Information Technology:

Program Learning Outcomes

This course contributes to the following program learning outcomes:

  • Enabling Knowledge:

You will gain skills as you apply knowledge effectively in diverse contexts.

  • Critical Analysis:

You will learn to accurately and objectively examine and consider computer science and information technology (IT) topics, evidence, or situations, in particular to:

-- analyse and model requirements and constraints for the purpose of designing and implementing software artefacts and IT systems

-- evaluate and compare designs of software artefacts and IT systems on the basis of organisational and user requirements.

  • Responsibility:

You will be required to accept responsibility for your own learning and make informed decisions about judging and adopting appropriate behaviour in professional and social situations. This includes accepting the responsibility for independent life-long learning. Specifically, you will learn to: effectively apply relevant standards, ethical considerations, and an understanding of legal and privacy issues to designing software applications and IT systems.


Course Learning Outcomes

Upon successful completion of this course you should be able to:

1. explain the functioning of security services in computing environments and the security issues in networked applications.
2. discuss various types of data integrity and confidentiality mechanisms including public key cryptography.
3. describe basic system security mechanisms and protocols, such as those used in operating systems, file systems and computer networks.
4. analyse the overarching importance of IT security in areas such as networking, databases, operating systems, and web systems.
5. apply privacy principles in basic practical settings in IT environments.
6. analyse and evaluate the security of computing and IT systems on a practical level and privacy related issues in computing.


Overview of Learning Activities

This course is delivered in on-campus mode but aims to provide multiple modes of delivery with course materials available electronically wherever possible. Each topic (in standard on-campus mode) consists of lectures and tutorials.

You will examine and analyse program constructs and structures and their relevance to security.

The learning activities included in this course are:

  • key concepts will be explained in lectures, classes or online, where course material will be presented and the subject matter will be illustrated with demonstrations and examples
  • tutorials and group discussions (including online forums) focused on practical work and problem solving will provide practice in the application of principles and procedures, allow exploration of concepts with teaching staff and other students
  • assignment work requires an integrated understanding of the subject matter with the application of theory to practice
  • private study, working through the course as presented in classes and learning materials, and gaining practice at analysing conceptual and technical issues related to security and privacy.

A total of 120 hours of study is expected during this course, comprising:

Teacher-directed hours (48 hours): lectures and tutorial sessions. Each week there will be 2 hours of lecture and 1 hour of tutorial work. You are encouraged to participate during lectures through asking questions, commenting on the lecture material based on your own experiences and through presenting solutions to written exercises. The tutorial sessions will introduce you to the tools and techniques necessary to undertake the assignment work.

Student-directed hours (72 hours): You are expected to be self-directed, studying independently outside class.


Overview of Learning Resources

You will make use of computer laboratories and relevant software provided by the School. You will be able to access course information and learning materials through myRMIT and may be provided with additional materials. Lists of relevant reference texts, resources in the library and freely accessible Internet sites will be provided.

Use the RMIT Bookshop textbook list search page to find any recommended textbook(s).

For extra support with study organisation, assignment planning or learning skills advice you may wish to contact the Study and Learning Centre http://www.rmit.edu.au/studyandlearningcentre


Overview of Assessment

The assessment for this course comprises two written assignments and a formal written end-of- semester examination. The assignments involve understanding of fundamental security techniques.

Note: This course has no hurdle requirements.

Assessment tasks

Assessment Task 1: Written Assignment 1
Weighting 15%
This assessment task supports CLOs 1 - 3

Assessment Task 2: Written Assignment 2
Weighting 35%
This assessment task supports CLOs 1 – 6

Assessment 3: End-of- Semester Examination
Weighting 50%
This assessment supports CLOs 1 - 6

Please note that postgraduate students are expected to demonstrate deeper knowledge and higher level application of knowledge and skills than undergraduate students.