Course Title: Introduction to Information Security
Part A: Course Overview
Course Title: Introduction to Information Security
Credit Points: 12.00
145H Mathematical & Geospatial Sciences
|Sem 1 2006,
Sem 2 2006,
Sem 1 2007,
Sem 2 2007,
Sem 2 2008,
Sem 2 2009,
Sem 2 2010,
Sem 2 2011,
Sem 2 2012,
Sem 2 2013,
Sem 2 2014,
Sem 2 2015,
Sem 2 2016
171H School of Science
|Sem 2 2017,
Sem 2 2019
Course Coordinator: Associate Professor Serdar Boztas
Course Coordinator Phone: +61 3 9925 2285
Course Coordinator Email: email@example.com
Course Coordinator Location: Building 8 Level 9
Course Coordinator Availability: By appointment, by email
Pre-requisite Courses and Assumed Knowledge and Capabilities
This course provides you with an overview of data and computer security and concentrates on (a) technical and (b) continuity management issues. The basic information security objectives such as data integrity, identification, message authentication, authorization, validation and access control are examined. Cryptographic techniques to realize these objectives are introduced. The basic philosophy of key management is also examined. In addition the ideas behind hacking, cracking and social engineering will be discussed in the context of ethics and their place in Information Security.
This course will enable you to :
- Apply the knowledge and skills obtained to study further concepts in Information Security; and
- Communicate and interpret ideas related to the principles of Information Security.
While this course provides a broad coverage of information security topics, you will have the opportunity to choose topics of particular interest for more in-depth examination in the course INTE1122 Case Studies in Information Security.
Objectives/Learning Outcomes/Capability Development
On completion of this course, you should be able to:
- Acquire a practical overview of the issues involved in the field of information security and assurance
- Demonstrate a basic understanding of the practice of IS, especially in evaluation of information security risks across diverse settings including the Internet and WWW based commerce systems, high bandwidth digital communications and funds transfer services.
- Explore the idea that in Information Security answers are not always known, and proposed solutions could give rise to new, equally complex problems.
- Navigate through the language and other dimensions of the field of information security in order to expand your knowledge, skills and their application.
- Acknowledge the ethical considerations in all judgements and decisions in academic and professional settings.
- Utilise software packages (for example Maple) to explore the intricacies of cryptography, demonstrating comprehension the use of these and other tools in Information Security.
This course contributes to the following Program Learning Outcomes for MC159 Master of Applied Science (Information Security and Assurance):
International Orientation and Strategic Thinking
- Graduates will have a strategic and practical overview of the issues in information security and assurance.
Critical Analysis and Problem Solving
- Evaluate information security risks across diverse service settings including the Internet and WWW based commerce systems, high bandwidth digital communications and funds transfer services,
- Undertake professional careers or postgraduate research in information security or other IT related fields, acquiring the required information needed to identify real world solutions to real world information security problems.
- Graduates will have the ability to communicate both technical and non-technical material in a range of forms (written, electronic, graphic, oral) and to tailor the style and means of communication to different audiences.
- Graduates will exhibit an ability to appreciate the ethical considerations that inform judgments and decision making in academic and professional settings.
Overview of Learning Activities
A variety of planned student learning experiences will be used to cater for the learning outcomes envisaged for this course. This includes seminars, group discussions, and laboratory based learning experiences.
The seminar format will provide you an overview of the specified study area and direct you to foundational, analytical and evidence-based readings about the practice of information security.
In addition to prescribed reading, you will be involved in facilitated open discussions in the seminar context, enabling you and your classmates to draw on your own professional work and life experiences, promoting interaction between those students with work experience and new graduates.
Individual and group activities, such as in-semester assessments, will be used to provide you with on-going feedback. An end-of-semester examination will complement this aspect of the work. In-semester assessments will take the form of weekly pop-quizzes, computer-based homework assignments and supervised class tests. These assessments will reinforce the material covered in lectures and discussions and in your personal study. The in-semester assessments will also emphasize the role of ethics in the academic arena.
The final examination tests your comprehension of the subject material and your ability to apply this understanding to real world problems.
Every week there will be 2 to 3 hours of lecture/discussion sessions, based on the online lecture material uploaded to Canvas in the days prior to the session. There will be 3 laboratory sessions of 1 hour duration each, in Weeks 1, 2 and 6.
In addition, you can expect to spend between 6 to 8 hours per week on independent study and research of the material assigned for the week.
Overview of Learning Resources
You will be expected to expand on the subject matter provided as lecture notes. This will take the form of accessing various external and internal resources, such as the library and the Internet. References to books, including text and reference books will be provided in class.
The Internet will be the most important source for academic, technical and white papers and you will be required to use this as a learning resource on a regular basis. In addition your classmates and tutor/lecturer are also important learning resources as will be demonstrated in facilitated discussions.
Canvas: This course is supported online using Canvas, which gives access to important announcements, a discussion forum, staff contact details, the teaching schedule, assessment timelines. You are advised to read your student EMS e-mail daily for important announcements. You should also visit the course Canvas site at least once a day where you will find important announcements regarding the course and all key documents.
Overview of Assessment
This course has no hurdle requirements.
Continuous Assessment Task: Weekly Pop Quiz based on the material assigned for the week’s discussion session.
This assessment task supports CLOs 3 & 4
Assessment Task 2: Maple Assignments
This assessment task supports CLOs 5 & 6
Assessment Task 3: Class Tests
This assessment task supports CLOs 1, 2, 3 & 4
Assessment 4: Final Exam
This assessment supports CLOs 1, 2, 3 & 4