INFO 2006 Usable Security

This is an archived copy of the 2021-2022 catalog. To access the most recent version of the catalog, please visit https://hbook.westernsydney.edu.au.

Credit Points 10

Legacy Code 102757

Coordinator Farnaz Farid Opens in new window

Description This unit will cover the human factors of security and privacy, as well as address emerging issues, challenges and regulations which underpin the need for usable security and privacy. After introducing the fundamental principles of security and privacy, these will be explored while considering how these principles shape the experience of users who are interacting with the designed product. Humans are an essential part of security and privacy, and they also inherently pose significant challenges. Students will be introduced to some of the fundamental security and privacy standards and regulations. They will learn about cognitive and perceptual approaches to usable security as well as how to create systems that are usable and trusted alongside fulfilling the requirements of remaining secure and private. Research topics such as how to design user studies to critically evaluate security, privacy, trust and usability interfaces will be addressed to provide students with an informed view on emerging best practices.

School Social Sciences

Discipline Security Science

Student Contribution Band HECS Band 2 10cp

Check your HECS Band contribution amount via the Fees page.

Level Undergraduate Level 2 subject

Pre-requisite(s) BEHV 1025 AND
COMP 1005

Learning Outcomes

On successful completion of this subject, students should be able to:
  1. Demonstrate an understanding of the principles of security, privacy and trust as they relate to key policies, standards and regulations.
  2. Evaluate key experimental techniques used in perceptual and cognitive science relevant to usable security and privacy.
  3. Explain approaches to social engineering, trust and organisational shift to cyber resilience, and location data permissions.
  4. Evaluate modern authentication methods in security.
  5. Critically analyse contemporary issues related to security and privacy.
  6. Create educational and/or training materials aimed to enhance security and privacy.

Subject Content

- Security, privacy and trust principles used in the design, development and assessment of a range of technologies.
- Security and privacy policies, standards, and regulations.
- Higher order cognitive principles which include aspects of learning, problem solving and decision making with a focus on trust, usability and user perception.
- Organisational shift towards a secure culture of cyber resilience through trust, usable security and behavioural economics.
- Warning and risk design; actions and consequences as both essential and inherently difficult while maintaining security and privacy.
- Humans as the weakest link in the cybersecurity, and educative/AI approaches and theories to counter this risk.
- Security authentication methods such as bio-informatics and password systems.
- Mobile security and privacy - locations and permissions in phone and communication apps.
Learn people, process and systems for Cyber Incident Response

Assessment

The following table summarises the standard assessment tasks for this subject. Please note this is a guide only. Assessment tasks are regularly updated, where there is a difference your Learning Guide takes precedence.

Item Length Percent Threshold Individual/Group Task
Report 1,500 words 40 N Individual
Simulation 3 days 20 N Individual
Report 2 pages 20 N Individual
Critical Review 800 words 20 N Individual

Teaching Periods

Autumn

Parramatta - Victoria Rd

Day

Subject Contact Farnaz Farid Opens in new window

View timetable Opens in new window

WSU Online TRI-2

Wsu Online

Online

Subject Contact Farnaz Farid Opens in new window

View timetable Opens in new window