IT Security
Duration
- One Semester or equivalent
Contact hours
- 48 hours
On-campus unit delivery combines face-to-face and digital learning.
2022 teaching periods
Swinburne Online Teaching Period 2 |
||
---|---|---|
Dates: Results: Last self enrolment: Census: Last withdraw without fail: |
Hawthorn Higher Ed. Semester 2 |
||
---|---|---|
Dates: Results: Last self enrolment: Census: Last withdraw without fail: |
Prerequisites
Aims and objectives
Students who complete this unit of study will understand the nature of security threats to IT systems. Student will be familiar with the tools used by hackers and crackers and be aware of ways of identifying and rectifying security breaches and will understand how to assess the vulnerability of computing systems.
Unit information in detail
- Teaching methods, assessment and content.
Teaching methods
All Applicable Locations | |||||
---|---|---|---|---|---|
Activity Type | Activity | Total Hours | Number of Weeks | Hours Per Week | Optional - Activity Details |
Face to Face Contact | Lecture | 24 | 12 weeks | 2 | No Description |
Face to Face Contact | Tutorials in Computer Labs | 24 | 12 weeks | 2 | No Description |
Unspecified Learning Activities | Independent Learning | 100 | 12 weeks | 8.33 | No Description |
Total Hours: | 148 | Total Hours (per week): | 12.33 |
Assessment
Types | Individual/Group Role | Weighting | Unit Learning Outcomes (ULOs) |
Applied Project | Individual | 35-45% | 1,2,3,4,5 |
Research Project | Individual | 35-45% | 1,2,4,6 |
Test | Individual | 15-25% | 1,2,4 |
As the minimum requirements of assessment to pass a unit and meet all Unit Learning Outcomes to a minimum standard, a student must achieve:
(i) an aggregate mark of 50% or more, and
(ii) at least 40% in the final exam.
Students who do not successfully achieve hurdle requirement (ii) will receive a maximum of 45% as the total mark for the unit.
Content
- Overview of Internet Crime and computer security threats
- Operating System Flaws
- Security Tools
- System logs
- Firewalls, security: theory, practice, design
- Ports scanning, packet sniffing and intrusion detection
- Understanding and responding to security alerts
- Server technologies, risks and policies
- Vulnerability analysis and Audit
- Secure programming practices
- Script injection and input sanitizing
- Security Models
- Physical Security
- Authentication (identity, biometrics and digital signatures)
Study resources
- Recommended reading and references.