Enrolments for this year have closed. Keep exploring subjects.
Australia’s fourth oldest university, the University of Tasmania, is highly regarded internationally for teaching and academic excellence. The university offers more than 100 undergraduate degrees and more than 50 postgraduate programs across a range of disciplines. The university offers students a diverse range of opportunities, the chance to learn from leading experts, and excellent preparation for their future careers.
QS RANKING 2022
Times Higher Education Ranking 2022
Upon completion of this subject, the student should be able to:
- Define the concepts of confidentiality, availability and integrity as they relate to information security.
- Compare and contrast information security governance and management of information security.
- Explain the principles of information security management in a variety of contexts.
- Apply discipline based skills and knowledge in dynamic practice situations
- Analyse and communicate core concepts related to discipline knowledge and practice
- Analyse and evaluate applications of innovative and/or entrepreneurial practice
- Develop and communicate understandings related to graduate attributes and transferable skills as adaptive practitioners
- Information Security Goals, Threats and Vulnerabilities
- Symmetric Encryption and Message Confidentiality
- Public-Key Cryptography and Message Authentication
- Hashing Algorithms
- Application Software Security
- Network Security
- Database Security
- Standards and Practices
- Contingency Planning and Incident Response
- Digital Forensics
No eligibility requirements
No additional requirements
In this subject you will learn about the basic principles and techniques for maintaining the confidentiality, integrity and availability of digital information. The basic topics covered include information security goals and threats, cryptographic algorithms, and procedures for safe and secure information flow. The advanced topics covered include incident response and contingency planning, standards and practices, and digital forensics.
You will gain practical information security experience by working on a realistic and complex case study that involves opportunity to respond to a work-related information security dilemma and rationalise and communicate information security solutions. By the end of the subject, you will know how to apply symmetric encryption to ensure message confidentiality, as well as public-key cryptography for message authentication, and how to integrate basic information security principles into network, application and database systems.
- Engagement Task 1: Tutorial Attendance (0%%)
- Engagement Task 2: Self Introduction (0%%)
- Case Study (50%%)
- Fortnightly Quizzes (20%%)
- Portfolio (30%%)