Course Title: Introduction to Information Security

Part A: Course Overview

Course Title: Introduction to Information Security

Credit Points: 12.00

Terms

Course Code

Campus

Career

School

Learning Mode

Teaching Period(s)

INTE1120

City Campus

Postgraduate

145H Mathematical & Geospatial Sciences

Face-to-Face

Sem 1 2006,
Sem 2 2006,
Sem 1 2007,
Sem 2 2007,
Sem 2 2008,
Sem 2 2009,
Sem 2 2010,
Sem 2 2011,
Sem 2 2012,
Sem 2 2013,
Sem 2 2014,
Sem 2 2015,
Sem 2 2016

INTE1120

City Campus

Postgraduate

171H School of Science

Face-to-Face

Sem 2 2017,
Sem 2 2019,
Sem 2 2021,
Sem 2 2022

INTE2602

RMIT University Vietnam

Postgraduate

171H School of Science

Face-to-Face

Viet1 2023

Flexible Terms

Course Code

Campus

Career

School

Learning Mode

Teaching Period(s)

INTE1120

City Campus

Postgraduate

171H School of Science

Internet

JulDec2022 (All)

Course Coordinator: Dr. Amy Corman

Course Coordinator Phone: NA

Course Coordinator Email: amy.corman@rmit.edu.au

Course Coordinator Availability: By appointment, by email


Pre-requisite Courses and Assumed Knowledge and Capabilities

None


Course Description

This course provides you with an overview of data and computer security and concentrates on (a) technical and (b) continuity management issues. The basic information security objectives such as data integrity, identification, message authentication, authorization, validation and access control are examined. Cryptographic techniques to realize these objectives are introduced. The basic philosophy of key management is also examined. In addition the ideas behind hacking, cracking and social engineering will be discussed in the context of ethics and their place in Information Security.


This course will enable you to :

  • Apply the knowledge and skills obtained to study further concepts in Information Security; and
  • Communicate and interpret ideas related to the principles of Information Security.

While this course provides a broad coverage of information security topics, you will have the opportunity to choose topics of particular interest for more in-depth examination in the course INTE1122 Case Studies in Information Security.


Objectives/Learning Outcomes/Capability Development

On completion of this course, you should be able to:

  1. Name and explain key practical issues involved in the field of information security and assurance 
  2. Demonstrate a basic understanding of the practice of Information Security, especially in evaluation of information security risks across diverse settings including the Internet and WWW based commerce systems, high bandwidth digital communications and funds transfer services. 
  3. Propose solutions to information security problems and evaluate from multiple perspectives to learn that in information security, answers are often ambiguous.
  4. Apply standard terminology, practices and other dimensions of the field of information security in order to expand your knowledge, skills and their application. 
  5. Discuss the ethical considerations in all judgements and decisions in academic and professional settings. 
  6. Utilise software packages (for example Maple, R) to explore the intricacies of cryptography, demonstrating comprehension the use of these and other tools in Information Security.


This course contributes to the following Program Learning Outcomes for MC159 Master of Applied Science (Information Security and Assurance):


International Orientation and Strategic Thinking

  • Graduates will have a strategic and practical overview of the issues in information security and assurance.

Critical Analysis and Problem Solving

  • Evaluate information security risks across diverse service settings including the Internet and WWW based commerce systems, high bandwidth digital communications and funds transfer services,
  • Undertake professional careers or postgraduate research in information security or other IT related fields, acquiring the required information needed to identify real world solutions to real world information security problems.

Communication

  • Graduates will have the ability to communicate both technical and non-technical material in a range of forms (written, electronic, graphic, oral) and to tailor the style and means of communication to different audiences.

Ethical Values

  • Graduates will exhibit an ability to appreciate the ethical considerations that inform judgments and decision making in academic and professional settings.
     


Overview of Learning Activities

A variety of planned student learning experiences will be used to cater for the learning outcomes envisaged for this course. This includes seminars, group discussions, and software-based learning experiences.
The seminar format will provide you an overview of the specified study area and direct you to foundational, analytical and evidence-based readings about the practice of information security.
In addition to prescribed reading, you will be involved in facilitated open discussions in the seminar context, enabling you and your classmates to draw on your own professional work and life experiences, promoting interaction between those students with work experience and new graduates.

Regular   tutorial/discussion sessions based on the online lecture material will be conducted to give opportunity for group learning and interaction with the facilitator.


Overview of Learning Resources

You will be expected to expand on the subject matter provided as lecture notes. This will take the form of accessing various external and internal resources, such as the library and the Internet. References to books, including text and reference books will be provided in class.

The Internet will be the most important source for academic, technical and white papers and you will be required to use this as a learning resource on a regular basis. In addition your classmates and tutor/lecturer are also important learning resources as will be demonstrated in facilitated discussions.

Canvas: This course is supported online using Canvas, which gives access to important announcements, a discussion forum, staff contact details, the teaching schedule, assessment timelines. You are advised to read your student EMS e-mail daily for important announcements. You should also visit the course Canvas site at least once a day where you will find important announcements regarding the course and all key documents.


Overview of Assessment

This course has no hurdle requirements.

Assessment Task

Assessment 1: R-based practical assessments
Weighting: 40% 
This assessment supports CLOs: 4 & 6

Assessment 2: Discipline-based knowledge demonstration
Weighting: 30% 
This assessment supports CLOs: 1,2,3 & 4 

Assessment 3: Case study response and reflection 
Weighting: 30% 
This assessment supports CLOs: 1,2,3,4 & 5