INFO 3001 Computer Security
Credit Points 10
Legacy Code 300569
Coordinator Tomas Trescak Opens in new window
Description This subject aims in particular at, but is not limited to, the implementation and management of security and privacy policies of organisations within the standards and legal framework that is also applicable to the Australian standards.
School Computer, Data & Math Sciences
Discipline Security Science
Student Contribution Band HECS Band 2 10cp
Check your HECS Band contribution amount via the Fees page.
Level Undergraduate Level 3 subject
Assumed Knowledge
Students are expected to have general understanding on computer systems; computer fundamentals, databases, and web technologies.
Learning Outcomes
- Explain fundamental theories related to computer security, and apply them to computer systems and organisations.
- Describe the modern authentication, authorisation and access control mechanisms used in computer systems; and look at a few methods of access operations and ownership issues.
- Explain basic concepts in encryption and cryptography and describe application of various cryptographic techniques and algorithms in accomplishing security.
- Examine security issues within various hardware systems, operating systems and application software and present the general causes that lead to system security failures.
- Analyse the security issues specific to databases, and understand how to protect sensitive information and statistical systems within an organisation.
- Identify security threats and risks associated with web and related technologies; and the capacity to make corrective and preventative measures against these threats and risks in organisations.
- Describe the relevant standards and the legal framework related to security and privacy; and implement security and privacy policies in organizations.
Subject Content
- Identification and authentication: System Security, Managing passwords, Online Verification Requirements, PKI, Key establishment, authentication and protocols;
- Access Control: Access operations, Ownership, Access control structure;
- Security in hardware and software: Data and Code, Memory management, Race conditions, Java Security, .NET security framework;
- Operating system security: Windows/Unix security,
- Cryptography: Symmetric/Asymmetric key Encryption, Digital signature, Hashing, Algorithms;
- Web security: IP security, SSL/TLS, DNS, Firewalls, cookies, Intrusion, Digital identification techniques, Client-side Digital Certificates, Certification Authorities, Sever side security, privacy;
- database security: SQL security model, statistical database security, integrated security, data privacy.
- Security policies and legal framework: Organizational policies, standards and legal framework for security and privacy;
1. Describe the complexities of working in the Cyber Security Industry
2. Identify legal and ethical issues of working in cyber environment
3. Differentiate between threats, vulnerabilities, and exploits
4. Identify network architectures and recognise their potential vulnerabilities
5. Apply reconnaissance methodologies to discover weaknesses in computing environment
6. Explain the differences between vulnerability management policies and vulnerability management maturity models
7. Apply concepts of exploiting vulnerabilities to hack into a system using common penetration testing tools and frameworks
8. Explain the principles of symmetric and asymmetric cryptography, and public key infrastructure
9. Identify data classification levels and email marking standards associated with the dissemination of sensitive and classified information
10. Identify data classification levels and email marking standards associated with the dissemination of sensitive and classified information
11. Identify threats in social networks via Open Source Intelligence (OSINT) Methodologies and demonstrate the capturing of Personally Identifiable Information (PII) using OSINT
12. Demonstrate usage of website security assessment tools to identify weaknesses and potential web attack vectors
13. Identify the types of forensic investigations from a cybersecurity perspective, differentiating between software and hardware digital forensic tools
14. Identify the resources required to navigate the cybersecurity landscape as a potential cybersecurity professional
Assessment
The following table summarises the standard assessment tasks for this subject. Please note this is a guide only. Assessment tasks are regularly updated, where there is a difference your Learning Guide takes precedence.
Type | Length | Percent | Threshold | Individual/Group Task |
---|---|---|---|---|
Quiz | 45 minutes (Weekly from Week 2) | 40 | N | Individual |
Quiz | 60 minutes | 20 | N | Individual |
Final Exam | 2 hours | 40 | N | Individual |
Prescribed Texts
- Pfleeger, C. P., Pfleeger, S. L., & Margulies, J. (2015). Security in computing (5th ed.). Upper Saddle River, NJ: Prentice Hall.
Teaching Periods
WSU Online TRI-1 (2022)
Wsu Online
Online
Subject Contact Natasha Daraio Opens in new window
View timetable Opens in new window
Sydney City Campus - Term 2 (2022)
Sydney City
Day
Subject Contact Antoinette Cevenini Opens in new window
View timetable Opens in new window
Spring (2022)
Campbelltown
Day
Subject Contact Tomas Trescak Opens in new window
View timetable Opens in new window
Penrith (Kingswood)
Day
Subject Contact Tomas Trescak Opens in new window
View timetable Opens in new window
Parramatta - Victoria Rd
Day
Subject Contact Tomas Trescak Opens in new window
View timetable Opens in new window
WSU Online TRI-3 (2022)
Wsu Online
Online
Subject Contact Rosalind Priestman Opens in new window
View timetable Opens in new window
Sydney City Campus - Term 1 (2023)
Sydney City
On-site
Subject Contact Harry Wang Opens in new window
View timetable Opens in new window
WSU Online TRI-2 (2023)
Wsu Online
Online
Subject Contact Tomas Trescak Opens in new window
View timetable Opens in new window
Spring (2023)
Campbelltown
On-site
Subject Contact Tomas Trescak Opens in new window
View timetable Opens in new window
Penrith (Kingswood)
On-site
Subject Contact Tomas Trescak Opens in new window
View timetable Opens in new window
Parramatta - Victoria Rd
On-site
Subject Contact Tomas Trescak Opens in new window