INFO 2006 Usable Security
Credit Points 10
Legacy Code 102757
Coordinator Farnaz Farid Opens in new window
Description This unit will cover the human factors of security and privacy, as well as address emerging issues, challenges and regulations which underpin the need for usable security and privacy. After introducing the fundamental principles of security and privacy, these will be explored while considering how these principles shape the experience of users who are interacting with the designed product. Humans are an essential part of security and privacy, and they also inherently pose significant challenges. Students will be introduced to some of the fundamental security and privacy standards and regulations. They will learn about cognitive and perceptual approaches to usable security as well as how to create systems that are usable and trusted alongside fulfilling the requirements of remaining secure and private. Research topics such as how to design user studies to critically evaluate security, privacy, trust and usability interfaces will be addressed to provide students with an informed view on emerging best practices.
School Social Sciences
Discipline Security Science
Student Contribution Band HECS Band 2 10cp
Check your HECS Band contribution amount via the Fees page.
Level Undergraduate Level 2 subject
Pre-requisite(s) BEHV 1025 AND
COMP 1005
Learning Outcomes
- Demonstrate an understanding of the principles of security, privacy and trust as they relate to key policies, standards and regulations.
- Evaluate key experimental techniques used in perceptual and cognitive science relevant to usable security and privacy.
- Explain approaches to social engineering, trust and organisational shift to cyber resilience, and location data permissions.
- Evaluate modern authentication methods in security.
- Critically analyse contemporary issues related to security and privacy.
- Create educational and/or training materials aimed to enhance security and privacy.
Subject Content
- Security and privacy policies, standards, and regulations.
- Higher order cognitive principles which include aspects of learning, problem solving and decision making with a focus on trust, usability and user perception.
- Organisational shift towards a secure culture of cyber resilience through trust, usable security and behavioural economics.
- Warning and risk design; actions and consequences as both essential and inherently difficult while maintaining security and privacy.
- Humans as the weakest link in the cybersecurity, and educative/AI approaches and theories to counter this risk.
- Security authentication methods such as bio-informatics and password systems.
- Mobile security and privacy - locations and permissions in phone and communication apps.
Learn people, process and systems for Cyber Incident Response
Assessment
The following table summarises the standard assessment tasks for this subject. Please note this is a guide only. Assessment tasks are regularly updated, where there is a difference your Learning Guide takes precedence.
Item | Length | Percent | Threshold | Individual/Group Task |
---|---|---|---|---|
Report | 1,500 words | 40 | N | Individual |
Simulation | 3 days | 20 | N | Individual |
Report | 2 pages | 20 | N | Individual |
Critical Review | 800 words | 20 | N | Individual |
Teaching Periods
Autumn
Parramatta - Victoria Rd
Day
Subject Contact Farnaz Farid Opens in new window
View timetable Opens in new window
WSU Online TRI-2
Wsu Online
Online
Subject Contact Farnaz Farid Opens in new window