Overview

This unit of study aims to provide you with a deeper understanding of protocol performance in the Internet and a comprehensive overview of common Cybersecurity issues and mechanisms to address these for online Engineering applications in your discipline

Teaching Periods
Location
Start and end dates
Last self-enrolment date
Census date
Last withdraw without fail date
Results released date
Semester 2
Location
Hawthorn
Start and end dates
29-July-2024
27-October-2024
Last self-enrolment date
11-August-2024
Census date
31-August-2024
Last withdraw without fail date
13-September-2024
Results released date
03-December-2024
Semester 2
Location
Hawthorn
Start and end dates
29-July-2024
27-October-2024
Last self-enrolment date
11-August-2024
Census date
31-August-2024
Last withdraw without fail date
13-September-2024
Results released date
03-December-2024

Learning outcomes

Students who successfully complete this unit will be able to:

  • Appraise various Internet protocols for suitability in different Engineering applications (A2, K3, K4, K5, S3)
  • Discuss Cybersecurity protocols to manage risk to data transferred over the Internet (A2, K3, S1, S2)
  • Design an Internet-based Engineering application (A7, K3, K5, S1, S2, S3)
  • Construct a secure system for remote applications (A7, K3, S2, S3, S4)

Teaching methods

Hawthorn

Type Hours per week Number of weeks Total (number of hours)
Face to Face Contact (Phasing out)
Lecture
1.00 12 weeks 12
Face to Face Contact (Phasing out)
Tutorial
1.00 10 weeks 10
Face to Face Contact (Phasing out)
Computer Laboratory
2.00 10 weeks 20
Specified Learning Activities (Phasing out)
Various
0.25 12 weeks 3
Unspecified Learning Activities (Phasing out)
Independent Learning
8.75 12 weeks 105
TOTAL150

Assessment

Type Task Weighting ULO's
PortfolioIndividual 100% 1,2,3,4 

Content

  • Transport Layer Protocols
  • TCP Congestion Control
  • Quality of Service and Active Queue Management
  • Threats to online applications
  • Encryption and Hashing
  • Public vs Symmetric Key Encryption
  • Certificates and PKI
  • Virtual Private Networks
  • System Hardening

Study resources

Reading materials

A list of reading materials and/or required textbooks will be available in the Unit Outline on Canvas.