Overview

Students who complete this unit of study will understand the nature of security threats to IT systems. Students will also be aware of deficiencies in modern software systems and will understand how to manage the security of computer networks. Students will be familiar with the tools used by hackers and crackers and be aware of ways of identifying and rectifying security breaches and they will be able to collect digital evidence and understand the rules of evidence gathering.

Requisites

Prerequisites
COS80013 Internet Security

Rule
COS60004 Creating Web Applications
OR
COS60007 Creating Web Applications and Databases
OR
Admission into MA-ITPC1 - Master of Information Technology (Professional Computing)
OR
Admission into MA-ITPC - Master of Information Technology (Professional Computing)
AND
TNE60002 Network Administration
OR
COS70007 Data Communications and Security
OR
COS80021 Web Application Development
OR
TNE60006 Networks and Switching

Teaching periods
Location
Start and end dates
Last self-enrolment date
Census date
Last withdraw without fail date
Results released date
Semester 1
Location
Hawthorn
Start and end dates
26-February-2024
26-May-2024
Last self-enrolment date
10-March-2024
Census date
31-March-2024
Last withdraw without fail date
12-April-2024
Results released date
02-July-2024

Learning outcomes

Students who successfully complete this unit will be able to:

  • Evaluate security of networks and servers
  • Determine suitable management plans for system security
  • Develop audit plans which rate security of hosts, networks and systems
  • Verify potential vulnerabilities through an understanding of social engineering
  • Prioritise penetration testing activities by using a variety of security-related tools
  • Verify potential vulnerabilities through an understand concepts of network monitoring
  • Analyse and interpret logs and make recommendations on current Internet Security based on independent research

Teaching methods

Hawthorn

Type Hours per week Number of weeks Total (number of hours)
On-campus
Lecture
2.00 12 weeks 24
On-campus
Class
1.00 12 weeks 12
Unspecified Activities
Independent Learning
9.50 12 weeks 114
TOTAL150

Assessment

Type Task Weighting ULO's
Assignment 1Individual/Group 30 - 40% 4,5,6,7 
Assignment 2Individual 30 - 40% 1,2,3,4,5,6,7 
Laboratory PracticalsIndividual 10 - 20% 1,2,3,4,5,6,7 
TestIndividual 10 - 20% 1,2,3,4,7 

Content

  • Overview of Internet Crime and computer security threats
  • Operating System Flaws
  • Introduction to maintaining a Secure System
  • Set up, patch and monitor
  • Tools
  • System logs
  • Firewalls, security: theory, practice, design and implementation
  • Ports scanning, packet sniffing and intrusion detection
  • Understanding and responding to security alerts
  • Server technologies, risks and policies
  • Vulnerability analysis and Audit
  • Secure programming practices
  • Security Models
  • Physical Security
  • Authentication (identity, biometrics and digital signatures)

Study resources

Reading materials

A list of reading materials and/or required textbooks will be available in the Unit Outline on Canvas.