Course Title: Security in Computing and Information Technology

Part A: Course Overview

Course Title: Security in Computing and Information Technology

Credit Points: 12.00

Terms

Course Code

Campus

Career

School

Learning Mode

Teaching Period(s)

COSC2536

City Campus

Undergraduate

140H Computer Science & Information Technology

Face-to-Face

Sem 2 2011,
Sem 1 2012,
Sem 2 2012,
Sem 1 2013,
Sem 2 2013,
Sem 1 2014,
Sem 2 2014,
Sem 2 2015,
Sem 1 2016,
Sem 2 2016

COSC2536

City Campus

Undergraduate

171H School of Science

Face-to-Face

Sem 1 2017,
Sem 2 2017,
Sem 1 2018,
Sem 2 2018,
Sem 1 2019,
Sem 2 2019,
Sem 1 2020,
Sem 2 2020,
Sem 1 2021

COSC2536

City Campus

Undergraduate

175H Computing Technologies

Face-to-Face

Sem 1 2022

COSC2537

City Campus

Postgraduate

140H Computer Science & Information Technology

Face-to-Face

Sem 2 2011,
Sem 1 2012,
Sem 2 2012,
Sem 1 2013,
Sem 2 2013,
Sem 1 2014,
Sem 2 2014,
Sem 2 2015,
Sem 1 2016,
Sem 2 2016

COSC2537

City Campus

Postgraduate

171H School of Science

Face-to-Face

Sem 1 2017,
Sem 2 2017,
Sem 1 2018,
Sem 1 2019,
Sem 2 2019,
Sem 1 2020,
Sem 2 2020

COSC2539

RMIT University Vietnam

Undergraduate

140H Computer Science & Information Technology

Face-to-Face

Viet2 2011,
Viet1 2012,
Viet3 2012,
Viet2 2013,
Viet1 2014,
Viet3 2014,
Viet2 2015,
Viet1 2016,
Viet3 2016

COSC2539

RMIT University Vietnam

Undergraduate

171H School of Science

Face-to-Face

Viet2 2017,
Viet3 2018,
Viet3 2019,
Viet3 2020,
Viet3 2021

COSC2539

RMIT University Vietnam

Undergraduate

175H Computing Technologies

Face-to-Face

Viet2 2022

COSC2651

Open Learning Australia

Non Award

171H School of Science

Distance / Correspondence

OUASP2UG21

Course Coordinator: Assoc Prof Ibrahim Khalil

Course Coordinator Phone: +61 3 9925 2879

Course Coordinator Email: ibrahim.khalil@rmit.edu.au

Course Coordinator Location: City campus, 14.11.25

Course Coordinator Availability: by appointment


Pre-requisite Courses and Assumed Knowledge and Capabilities

None


Course Description

Security has become a focal area in IT; it has grown and evolved significantly in recent years and different areas of specialisation have emerged.

This course gives an introduction to technical aspects of security for future IT professionals, and presents the foundations. It looks at fundamental cryptographic and security mechanisms used in various areas of networked applications and computing, including operating systems, databases and web-based applications as well as modern privacy preserving systems and blockchains.

For computer systems that are used and relied upon in many areas of life, security has become an important aspect; availability and correct operation are essential. IT professionals working in the field need to be well acquainted with the security features of the tools and applications they use and produce. Protection of data regardless of the information they contain is a critical task, and requires expertise.


Objectives/Learning Outcomes/Capability Development

This course contributes to the following program learning outcomes in BP094 Bachelor of Computer Science; BP096 Bachelor of Software Engineering and BP162 Bachelor of Information Technology:

Program Learning Outcomes

This course contributes to the following program learning outcomes:

  • Enabling Knowledge:

You will gain skills as you apply knowledge effectively in diverse contexts.

  • Critical Analysis:

You will learn to accurately and objectively examine and consider computer science and information technology (IT) topics, evidence, or situations, in particular to:

-- analyse and model requirements and constraints for the purpose of designing and implementing software artefacts and IT systems

-- evaluate and compare designs of software artefacts and IT systems on the basis of organisational and user requirements.

  • Responsibility:

You will be required to accept responsibility for your own learning and make informed decisions about judging and adopting appropriate behaviour in professional and social situations. This includes accepting the responsibility for independent life-long learning. Specifically, you will learn to: effectively apply relevant standards, ethical considerations, and an understanding of legal and privacy issues to designing software applications and IT systems.


Course Learning Outcomes

Upon successful completion of this course you should be able to:

1. explain the functioning of security services in computing environments and the security issues in networked applications.
2. discuss various types of data integrity and confidentiality mechanisms including public key cryptography.
3. describe basic system security mechanisms and protocols, such as those used in operating systems, file systems and computer networks.
4. analyse the overarching importance of IT security in areas such as networking, databases, operating systems, and web systems.
5. apply privacy principles in basic practical settings in IT environments.
6. analyse and evaluate the security of computing and IT systems on a practical level and privacy related issues in computing.


Overview of Learning Activities

This course is delivered in on-campus mode but aims to provide multiple modes of delivery with course materials available electronically wherever possible. Each topic (in standard on-campus mode) consists of lectures and tutorials.

You will examine and analyse program constructs and structures and their relevance to security.

The learning activities included in this course are:

  • key concepts will be explained in lectures, classes or online, where course material will be presented and the subject matter will be illustrated with demonstrations and examples
  • tutorials and group discussions (including online forums) focused on practical work and problem solving will provide practice in the application of principles and procedures, allow exploration of concepts with teaching staff and other students
  • assignment work requires an integrated understanding of the subject matter with the application of theory to practice
  • private study, working through the course as presented in classes and learning materials, and gaining practice at analysing conceptual and technical issues related to security and privacy.

A total of 120 hours of study is expected during this course, comprising:

Teacher-directed hours (48 hours): lectures and tutorial sessions. Each week there will be 2 hours of lecture and 1 hour of tutorial work. You are encouraged to participate during lectures through asking questions, commenting on the lecture material based on your own experiences and through presenting solutions to written exercises. The tutorial sessions will introduce you to the tools and techniques necessary to undertake the assignment work.

Student-directed hours (72 hours): You are expected to be self-directed, studying independently outside class.


Overview of Learning Resources

You will make use of computer laboratories and relevant software provided by the School. You will be able to access course information and learning materials through myRMIT and may be provided with additional materials. Lists of relevant reference texts, resources in the library and freely accessible Internet sites will be provided.

Use the RMIT Bookshop textbook list search page to find any recommended textbook(s).

For extra support with study organisation, assignment planning or learning skills advice you may wish to contact the Study and Learning Centre http://www.rmit.edu.au/studyandlearningcentre


Overview of Assessment

The assessment for this course comprises three written timed assignments – (i) two industry focused assignments that involve both practical and theoretical works on security, cryptography, security protocols, and development of secure applications, and (ii) an end-of-semester summative assignment involving understanding of all aspects of fundamental security techniques taught in the course.

Note: This course has no hurdle requirements.

Assessment Task 1: Industry-focussed Security Assignment 1, weighting 35%
Assignment 1 will focus on developing industry focused secure applications where you apply your abilities, understanding and knowledge on the topics that include basic cryptographic Techniques like symmetric-key cryptography, hash, and cryptanalysis, and Public-Key Cryptography such RSA, ElGamal and Paillier cryptosystems.

This assessment task supports CLOs 1 - 3

Assessment Task 2: Industry-focussed Security Assignment 2, weighting 50%
Assignment 2 will focus on developing industry focused secure applications where you apply your abilities, understanding and knowledge on the topics that include Privacy-preserving computations based on RSA, ElGamal and Paillier Cryptosystems; Digital Signature, Blockchain and Cryptocurrency, Digital Authentication & Security Protocols, and Digital Authorisation and Intrusion Detection. The objective of Assignment 2 is evaluating critical analysis and decision making related to secure systems.

This assessment task supports CLOs 1 - 6

Assessment Task 3: End-of-Semester summative Exercise, weighting 15%
Assignment 3 will focus on all aspects of security, cryptography, protocols, and applications taught in this course. The objective of Assignment 3 is evaluating problem solving ability and critical analysis in the form of several short questions.

This assessment supports CLOs 1 - 6