Your upfront cost: $0
- 20 Jul 2020
QS RANKING 2020
Times Higher Education Ranking 2020
Upon completion of this subject, the student should be able to:
- Define the concepts of confidentiality, availability and integrity as they relate to information security.
- Compare and contrast information security governance and management of information security.
- Explain the principles of information security management in a variety of contexts.
- Apply discipline based skills and knowledge in dynamic practice situations
- Analyse and communicate core concepts related to discipline knowledge and practice
- Analyse and evaluate applications of innovative and/or entrepreneurial practice
- Develop and communicate understandings related to graduate attributes and transferable skills as adaptive practitioners
- Information Security Goals, Threats and Vulnerabilities
- Symmetric Encryption and Message Confidentiality
- Public-Key Cryptography and Message Authentication
- Hashing Algorithms
- Application Software Security
- Network Security
- Database Security
- Standards and Practices
- Contingency Planning and Incident Response
- Digital Forensics
No eligibility requirements
No special requirements
In this subject you will learn about the basic principles and techniques for maintaining the confidentiality, integrity and availability of digital information. The basic topics covered include information security goals and threats, cryptographic algorithms, and procedures for safe and secure information flow. The advanced topics covered include incident response and contingency planning, standards and practices, and digital forensics.
You will gain practical information security experience by working on a realistic and complex case study that involves opportunity to respond to a work-related information security dilemma and rationalise and communicate information security solutions. By the end of the subject, you will know how to apply symmetric encryption to ensure message confidentiality, as well as public-key cryptography for message authentication, and how to integrate basic information security principles into network, application and database systems.
- Engagement Task 1: Tutorial Attendance (0%%)
- Engagement Task 2: Self Introduction (0%%)
- Case Study (50%%)
- Fortnightly Quizzes (20%%)
- Portfolio (30%%)
Check the learning management system (LMS) of your university for textbook details.