Cyber Terrorism and Information Warfare - 2016

To enrol in this unit, you must be accepted into a course from the provider. Read before you start

Unit summary

PICX808

  • Level of Study: Postgraduate
  • Study load: 0.125 EFTSL
  • Delivery method: Fully Online
  • Prerequisites: Yes
  • Duration: 14 weeks
  • Government loans available: FEE-HELP
  • Availability for 2016: Sess 1
  • Availability for 2017: Sem1
  • Assessment: Assignment 1 (20%) , Assignment 2 (40%) - Learn more

Unit provided by

or
2016 Fees
AUD$
Domestic 3,120.00
International 3,370.00

This unit was previously known as Information Warfare & Cyberterrorism.

Computer systems and networks, and the applications that they support, are core elements of critical infrastructure for public and private sector organisations in the twenty-first century. This unit will present a high-level overview of how cyber terrorist threats and foreign states, might infiltrate systems and gain control of critical infrastructure. The unit explores how different vertical industries face specific threats from their use of current day technology. The 'human factor' in dealing with cyber terrorist threats will be emphasised.

At completion of this unit students will be able to:

  1. evaluate the major weaknesses in today's cyber systems, networks and applications, and how they can be exploited by cyber terrorists
  2. evaluate and critique strategic and tactical defences available to eliminate the threats from cyber terrorism, from a high-level approach to risk management and security policies and the risks to critical infrastructure
  3. demonstrate a higher level understanding of, and ability to evaluate, strategies to investigate and defeat the illegitimate use of the Internet for  cyber terrorism
  4. examine and explore critical texts, concepts and theories relating to cyber terrorism.
  • Assignment 1 (20%)
  • Assignment 2 (40%)
  • Assignment 3 (40%)

Equivalent units

You cannot enrol in this unit if you have successfully completed any of the following unit(s) because they are considered academically equivalent:

  • PIC880 — Information Warfare & Cyberterrorism
  • Broadband access — Students are required to have regular access to a computer and the internet. Mobile devices alone are not sufficient

This unit addresses the following topics.

NumberTopic
1Cybercrime and Cyberterrorism
2Underpinning Architecture I: Vulnerabilities of Computer Systems
3Threats and Responses
4Social Engineering; Cryptography
5Privacy Issues
6Mitigation
7The Future

This unit is delivered using the following methods and materials:

Instructional Methods

  • Discussion Forum/Discussion Board
  • Online assignment submission

Online materials

  • Resources and Links

This unit is a core requirement in the following courses:

This unit is part of a major, minor, stream or specialisation in the following courses:

This unit may be eligible for credit towards other courses:

  1. Many undergraduate courses on offer through OUA include 'open elective' where any OUA unit can be credited to the course. You need to check the Award Requirements on the course page for the number of allowed open electives and any level limitations.
  2. In other cases, the content of this unit might be relevant to a course on offer through OUA or elsewhere. In order to receive credit for this unit in the course you will need to supply the provider institution with a copy of the Unit Profile in the approved format, which you can download here. Note that the Unit Profile is set at the start of the year, and if textbooks change this may not match the Co-Op textbook list.
This unit does not have a prescribed textbook(s).

Enquire online

Need to ask a question that's best put down in words?
Make an online enquiry.

Enquire now

Ready to enrol?

Start studying this unit now.

or

Got a question?

Get an answer from one of our friendly Student Advisors.