Subject details

At completion of this subject students will be able to:

  1. understand and differentiate characteristics and typologies of different crime threats and trends in the cyber space
  2. analyse how nation-states and non-nation-states actors utilize the internet as an attack vector in information warfare to infiltrate digital systems and gain control of critical infrastructure through the use of case studies
  3. identify the value of the Internet as a vehicle to recruit, communicate, and fund terrorism
  4. Analyse the technical, social and political drivers of cyber terrorism and information warfare.
  5. Develop the ability to conduct independent and collaborative research through written and oral presentations
  • Topics

    • A week-by-week guide to the topics you will explore in this subject will be provided in your study materials.
  • Study resources

    • Instructional Methods

      • Disscusion forum/Discussion Board
      • Online assignment submission
    • Online Materials

      • Resources and Links

Entry Requirements

Equivalent Subjects

You cannot enrol in this unit if you have successfully completed any of the following subject(s) because they are considered academically equivalent:

  • MAQ-PIC880

Special requirements

No special requirements

This subject was previously known as Information Warfare & Cyberterrorism.

Cyberspace is borderless and global. The emergence of modern technology and an information-based world has created new opportunities for criminals. This subject provides an overview of these new threats in terms of global security and the implications for law enforcement and national security responses. The degree will analyse the processes of cyber terrorism and information cyber warfare through historical, operational and strategic perspectives. Topics like the role of the internet in radicalisation, extremism and recruitment, and the role of digital currency in money laundering and recruiting will be covered. Students will gain an understanding of various definitions of cyber terrorism and information warfare, and through an application of case studies will analyse and critique existing literature and understanding of these subject matters. They will also be able to analyse how nation states and non-nation state actors utilise the internet as an attack vector in information warfare to infiltrate digital systems to gain control of critical infrastructure. The subject is interactive and students are expected to actively participate in seminars and online discussion forums.

  • Assignment 1 - Assignment 1 (10%)
  • Assignment 2 - Assignment 2 (15%)
  • Assignment 3 - Assignment 3 (15%)
  • Assignment 4 - Assignment 4 (20%)
  • Assignment 5 - Assignment 5 (40%)

Textbooks are subject to change within the academic year. Students are advised to purchase their books no earlier than one to two months before the start of a subject.

View textbooks

Related degrees