Course Title: Introduction to Information Security
Part A: Course Overview
Course Title: Introduction to Information Security
Credit Points: 12.00
Terms
Course Code |
Campus |
Career |
School |
Learning Mode |
Teaching Period(s) |
INTE1120 |
City Campus |
Postgraduate |
145H Mathematical & Geospatial Sciences |
Face-to-Face |
Sem 1 2006, Sem 2 2006, Sem 1 2007, Sem 2 2007, Sem 2 2008, Sem 2 2009, Sem 2 2010, Sem 2 2011, Sem 2 2012, Sem 2 2013, Sem 2 2014, Sem 2 2015, Sem 2 2016 |
INTE1120 |
City Campus |
Postgraduate |
171H School of Science |
Face-to-Face |
Sem 2 2017, Sem 2 2019, Sem 2 2021, Sem 2 2022, Sem 2 2024 |
INTE2602 |
RMIT University Vietnam |
Postgraduate |
171H School of Science |
Face-to-Face |
Viet1 2023 |
Flexible Terms
Course Code |
Campus |
Career |
School |
Learning Mode |
Teaching Period(s) |
INTE1120 |
City Campus |
Postgraduate |
171H School of Science |
Internet |
JulDec2022 (All) |
INTE1120 |
City Campus |
Postgraduate |
171H School of Science |
Internet |
JanJun2024 (All) |
Course Coordinator: Dr. Amy Corman
Course Coordinator Phone: NA
Course Coordinator Email: amy.corman@rmit.edu.au
Course Coordinator Availability: By appointment, by email
Pre-requisite Courses and Assumed Knowledge and Capabilities
None
Course Description
This course provides you with an overview of data and computer security and concentrates on (a) technical and (b) continuity management issues. The basic information security objectives such as data integrity, identification, message authentication, authorization, validation and access control are examined. Cryptographic techniques to realize these objectives are introduced. The basic philosophy of key management is also examined. In addition the ideas behind hacking, cracking and social engineering will be discussed in the context of ethics and their place in Information Security.
This course will enable you to :
- Apply the knowledge and skills obtained to study further concepts in Information Security; and
- Communicate and interpret ideas related to the principles of Information Security.
While this course provides a broad coverage of information security topics, you will have the opportunity to choose topics of particular interest for more in-depth examination in the course INTE1122 Case Studies in Information Security.
Objectives/Learning Outcomes/Capability Development
On completion of this course, you should be able to:
- Name and explain key practical issues involved in the field of information security and assurance
- Demonstrate a basic understanding of the practice of Information Security, especially in evaluation of information security risks across diverse settings including the Internet and WWW based commerce systems, high bandwidth digital communications and funds transfer services.
- Propose solutions to information security problems and evaluate from multiple perspectives to learn that in information security, answers are often ambiguous.
- Apply standard terminology, practices and other dimensions of the field of information security in order to expand your knowledge, skills and their application.
- Discuss the ethical considerations in all judgements and decisions in academic and professional settings.
- Utilise software packages (for example Maple, R) to explore the intricacies of cryptography, demonstrating comprehension the use of these and other tools in Information Security.
This course contributes to the following Program Learning Outcomes for MC159 Master of Applied Science (Information Security and Assurance):
International Orientation and Strategic Thinking
- Graduates will have a strategic and practical overview of the issues in information security and assurance.
Critical Analysis and Problem Solving
- Evaluate information security risks across diverse service settings including the Internet and WWW based commerce systems, high bandwidth digital communications and funds transfer services,
- Undertake professional careers or postgraduate research in information security or other IT related fields, acquiring the required information needed to identify real world solutions to real world information security problems.
Communication
- Graduates will have the ability to communicate both technical and non-technical material in a range of forms (written, electronic, graphic, oral) and to tailor the style and means of communication to different audiences.
Ethical Values
- Graduates will exhibit an ability to appreciate the ethical considerations that inform judgments and decision making in academic and professional settings.
Overview of Learning Activities
You will be actively engaged in a range of learning activities such as lectorials, tutorials, practicals, laboratories, seminars, project work, class discussion, individual and group activities. Delivery may be face to face, online or a mix of both.
You are encouraged to be proactive and self-directed in your learning, asking questions of your lecturer and/or peers and seeking out information as required, especially from the numerous sources available through the RMIT library, and through links and material specific to this course that is available through myRMIT Studies Course.
Overview of Learning Resources
RMIT will provide you with resources and tools for learning in this course through myRMIT Studies Course.
There are services available to support your learning through the University Library. The Library provides guides on academic referencing and subject specialist help as well as a range of study support services. For further information, please visit the Library page on the RMIT University website and the myRMIT student portal.
Overview of Assessment
Assessment Task
Assessment Task 1: R-based practical assessments
Weighting 40%
This assessment supports CLOs 4 & 6
Assessment Task 2: Discipline-based knowledge demonstration
Weighting 30%
This assessment supports CLOs 1, 2, 3 & 4
Assessment Task 3: Case study response and reflection
Weighting 30%
This assessment supports CLOs 1, 2, 3, 4 & 5
If you have a long-term medical condition and/or disability it may be possible to negotiate to vary aspects of the learning or assessment methods. You can contact the program coordinator or Equitable Learning Services if you would like to find out more.