Part A: Course Overview
Course Title: Secure Electronic Commerce
Credit Points: 12.00
Terms
Course Code |
Campus |
Career |
School |
Learning Mode |
Teaching Period(s) |
INTE1070 |
City Campus |
Postgraduate |
140H Computer Science & Information Technology |
Face-to-Face |
Sem 1 2006, Sem 1 2007, Sem 1 2008, Sem 1 2009, Sem 1 2010, Sem 1 2011, Sem 1 2012, Sem 1 2013, Sem 1 2014 |
INTE1070 |
City Campus |
Postgraduate |
171H School of Science |
Face-to-Face |
Sem 2 2017, Sem 2 2018, Sem 2 2019, Sem 2 2020 |
INTE1070 |
City Campus |
Postgraduate |
175H Computing Technologies |
Face-to-Face |
Sem 2 2022, Sem 2 2023, Sem 2 2024 |
INTE1071 |
City Campus |
Undergraduate |
140H Computer Science & Information Technology |
Face-to-Face |
Sem 1 2006, Sem 1 2007, Sem 1 2008, Sem 1 2009, Sem 1 2010, Sem 1 2011, Sem 1 2012, Sem 1 2013, Sem 1 2014 |
INTE1071 |
City Campus |
Undergraduate |
171H School of Science |
Face-to-Face |
Sem 2 2017, Sem 2 2018, Sem 2 2019, Sem 2 2020, Sem 2 2021 |
INTE1071 |
City Campus |
Undergraduate |
175H Computing Technologies |
Face-to-Face |
Sem 2 2022, Sem 2 2023, Sem 2 2024 |
Course Coordinator: Professor Ibrahim Khalil
Course Coordinator Phone: +61 3 9925 2879
Course Coordinator Email: ibrahim.khalil@rmit.edu.au
Course Coordinator Location: 14.11.025
Course Coordinator Availability: by appointment
Pre-requisite Courses and Assumed Knowledge and Capabilities
Enforced Pre-Requisite Courses
Successful completion of the following course/s:
-
INTE2625/INTE2633/INTE2634 Introduction to Cyber Security (Course ID 054986)
OR - COSC2536/COSC2539/COSC2716 Security in Computing and Information Technology (Course ID 045940)
Note: it is a condition of enrolment at RMIT that you accept responsibility for ensuring that you have completed the prerequisite/s and agree to concurrently enrol in co-requisite courses before enrolling in a course.
For information go to RMIT Course Requisites webpage.
If you have completed prior studies at RMIT or another institution that developed the skills and knowledge covered in the above course/s you may be eligible to apply for credit transfer.
Alternatively, if you have prior relevant work experience that developed the skills and knowledge covered in the above course/s you may be eligible for recognition of prior learning.
Please follow the link for further information on how to apply for credit for prior study or experience.
Course Description
The course is an introduction to secure e-commerce, focusing on the principles and concepts related to computer-based, electronic transactions.
This course provides practical examples of how the security theories are applied in the digital world.
Students will learn to effectively explain the key technical aspects of e-commerce application security. They will become fully aware of the primary threats that e-commerce applications face and will be provided with practical hands-on opportunities to execute various attacks and identify vulnerabilities within the system. Additionally, they will acquire the necessary knowledge and skills to utilize cutting-edge technologies essential for combating these attacks.
If you are enrolled in this course as a component of your Bachelor Honours Program, your overall mark will contribute to the calculation of the weighted average mark (WAM).
See the WAM information web page for more information.
Objectives/Learning Outcomes/Capability Development
Program Learning Outcomes
This course contributes to the program learning outcomes for the following program(s):
BP355 - Bachelor of Cyber Security
BP356 - Bachelor of Cyber Security (Professional)
Major - Cyber Security
- BP162O - Bachelor of Information Technology (RMITO)
- BP162P23 - Bachelor of Information Technology
- BP349 - Bachelor of Information Technology (Professional)
- BP094P23 - Bachelor of Computer Science
- BP340P23 - Bachelor of Data Science
- BP347 - Bachelor of Computer Science (Professional)
- BP348 - Bachelor of Data Science (Professional)
PLO 1 Knowledge -- Apply a broad and coherent set of knowledge and skills for developing user-centric information technology solutions for contemporary societal challenges.
PLO 3 Cognitive and Technical Skill -- Critically analyse and evaluate user requirements and design systems employing software development tools, techniques and emerging technologies.
For more information on the program learning outcomes for your program, please see the program guide.
Upon successful completion of this course, you will be able to:
- Explain security requirements of an e-commerce application.
- Identify and analyze key threats by launching attacks on e-commerce applications.
- Integrate basic security mechanisms, secure payment gateways, and protocols in an e-commerce application.
- Evaluate Digital Cash and Cryptocurrency technologies and their applications in e-commerce applications.
- Develop and evaluate an actionable, reliable, efficient, and scalable e-commerce application.
Overview of Learning Activities
You will be actively engaged in a range of learning activities such as lectorials, tutorials, practicals, laboratories, seminars, project work, class discussion, individual and group activities. Delivery may be face to face, online or a mix of both.
You are encouraged to be proactive and self-directed in your learning, asking questions of your lecturer and/or peers and seeking out information as required, especially from the numerous sources available through the RMIT library, andthrough links and material specific to this course that is available through myRMIT Studies Course.
Overview of Learning Resources
RMIT will provide you with resources and tools for learning in this course through myRMIT Studies Course.
There are services available to support your learning through the University Library. The Library provides guides on academic referencing and subject specialist help as well as a range of study support services. For further information, please visit the Library page on the RMIT University website and the myRMIT student portal.
Overview of Assessment
You will be assessed on how well you meet the course learning outcomes and on your development against the program learning outcomes.
This course has no hurdle requirements
Assessment Tasks:
Assessment Task 1: Industry-focused Security Assignment 1
Weighting: 25%
This assessment task supports CLOs: 1 & 2.
Assessment Task 2: Industry-focused Security Assignment 2
Weighting: 50%
This assessment task supports CLOs: 3 - 5.
Assessment Task 3: Designing and Analysing a Secure E-Commerce System
Weighting: 25%
This assessment task supports CLOs: 1 - 5.
If you have a long-term medical condition and/or disability it may be possible to negotiate to vary aspects of the learning or assessment methods. You can contact the program coordinator or Equitable Learning Services if you would like to find out more.