INFO 3006 Information Security
Credit Points 10
Legacy Code 300128
Coordinator Yun Bai Opens in new window
Description Information Security is concerned with the protection and privacy of information in computer systems. The focus is primarily on introducing cryptography concept, algorithm and protocol in information security and applying such knowledge in the design and implementation of secure computer and network systems. The subject also addresses conventional and public key encryption, number theory and algebra and their application in public key encryption and signature. Students will learn the application of cryptography algorithm in current computer systems and information security management. This subject also provides students with the practical experience around security programming.
School Computer, Data & Math Sciences
Discipline Security Science
Student Contribution Band HECS Band 2 10cp
Check your HECS Band contribution amount via the Fees page.
Level Undergraduate Level 3 subject
Pre-requisite(s) MATH 1006 AND
COMP 2009 OR
COMP 2015 OR
COMP 2016
Assumed Knowledge
Basic understanding of data structures, number theory and probability theory. Basic programming skills in C, C++, java, etc.
Learning Outcomes
- Describe fundamentals in computer security and basic knowledge in cryptography;
- Explain conventional encryption/decryption methods and the concepts of symmetric keys;
- Design and implement block ciphers and stream ciphers;
- Explain principles of public key cryptosystems and public key algorithms;
- Summarize the number theory used in the RSA algorithm, Diffie-Hellman key exchange and digital signatures;
- Apply authentication functions and hash functions in message authentication;
- Illustrate Kerberos authentication protocols;
- Apply security requirements and design in electronic mail systems and in electronic commerce.
- Explain principles and mechanisms of security management.
Subject Content
Conventional encryption and DES system
Number Theory and algebra, Modular arithmetic and Euclid's algorithm
Public key encryption and RSA algorithm
Digital signature and authentication protocols
Key distribution and management
Security protocols and various applications in current computer systems
Information Security management
Assessment
The following table summarises the standard assessment tasks for this subject. Please note this is a guide only. Assessment tasks are regularly updated, where there is a difference your Learning Guide takes precedence.
Type | Length | Percent | Threshold | Individual/Group Task |
---|---|---|---|---|
Short Answer | 2-5 pages | 25 | N | Individual |
Practical | 500 lines of program | 25 | N | Individual |
Final Exam | 2 hours | 50 | Y | Individual |
Prescribed Texts
- Stallings, W. (2017). Cryptography and network security : principles and practice (7th ed.). Boston: Pearson.
Teaching Periods
Spring (2022)
Penrith (Kingswood)
Day
Subject Contact Yun Bai Opens in new window
View timetable Opens in new window
Parramatta - Victoria Rd
Day
Subject Contact Yun Bai Opens in new window
View timetable Opens in new window
Spring (2023)
Penrith (Kingswood)
On-site
Subject Contact Yun Bai Opens in new window
View timetable Opens in new window
Parramatta - Victoria Rd
On-site
Subject Contact Yun Bai Opens in new window