INFO2315: Introduction to IT Security (2017 - Semester 2)
|Unit:||INFO2315: Introduction to IT Security (6 CP)|
|Faculty/School:||School of Information Technologies|
Dr Stavrakakis, John
|Session options:||Semester 2|
|Versions for this Unit:|
|Site(s) for this Unit:||
|Brief Handbook Description:||This unit provides a broad introduction to the field of IT security. We examine secure and insecure programs, secure and insecure information, secure and insecure computers, and secure and insecure network infrastructure. Key content includes the main threats to security; how to analyse risks; the role in reducing risk that can be played by technical tools (such as encryption, signatures, access control, firewalls, etc); the limitations of technical defences; and the simple process and behavioural changes that can reduce risk.|
|Assumed Knowledge:||In order to enter this unit, students should have at least one semester of tertiary study of IT. In particular, we assume familiarity with the value of information, and with the varied uses of IT in business and personal activities. We also assume an introductory level of skill in using a computer (for example, creating and moving files and folders, downloading and installing files, etc). The assumed background would be achieved by completing INFO1003 Foundations of IT. We also assume previous instruction in verbal presentations and teamwork.|
Dr Stavrakakis, John
|T&L Activities:||Independent Study: Reading, preparation, study, and doing asisgnments|
Attributes listed here represent the key course goals (see Course Map tab) designated for this unit. The list below describes how these attributes are developed through practice in the unit. See Learning Outcomes and Assessment tabs for details of how these attributes are assessed.
|Attribute Development Method||Attribute Developed|
|A broad introduction to the field of IT security.||Engineering/IT Specialisation (Level 2)|
|Understanding of the essential concepts of security, and of the fundamentals of computer system organisation (hardware and software components) that impact on security||Maths/Science Methods and Tools (Level 2)|
|Gathering and evaluating information from the published literature||Information Seeking (Level 2)|
|Producing verbal presentations||Communication (Level 2)|
|Practice in teamwork, time management.
Awareness of ethical, legal & social issues associated with security.
Ability to carry out a risk analysis.
|Professional Conduct (Level 2)|
For explanation of attributes and levels see Engineering & IT Graduate Outcomes Table.
Learning outcomes are the key abilities and knowledge that will be assessed in this unit. They are listed according to the course goal supported by each. See Assessment Tab for details how each outcome is assessed.Engineering/IT Specialisation (Level 2)
Assignment: Assignment 1. An individual assignment, doing paper-based questions on terminology and concepts, on material from weeks 1-5.
Assignment: Assignment 2. Individual written essay-style assignment.
Attendance: Laboratory participation. Based on weekly attendance and involvement in laboratory tasks.
Final Exam: Covers all aspects of the unit of study. It will test the candidates’ knowledge of security concepts, and of particular threats and controls as presented during the semester.Two hours.
Assignment: Assignment 3. Group assignment, doing presentation in lab classes, explaining a recent development from the academic literature or technical press.
|Policies & Procedures:||IMPORTANT: School policy relating to Academic Dishonesty and Plagiarism.
In assessing a piece of submitted work, the School of IT may reproduce it entirely, may provide a copy to another member of faculty, and/or to an external plagiarism checking service or in-house computer program and may also maintain a copy of the assignment for future checking purposes and/or allow an external service to do so.
See the policies page of the faculty website at http://sydney.edu.au/engineering/student-policies/ for information regarding university policies and local provisions and procedures within the Faculty of Engineering and Information Technologies.
Note: Students are expected to have a personal copy of all books listed.
|Online Course Content:||http://www.ug.it.usyd.edu.au/~info2315|
Note that the "Weeks" referred to in this Schedule are those of the official university semester calendar https://web.timetable.usyd.edu.au/calendar.jsp
|Week 3||System Security|
|Week 4||Software Security|
|Week 5||Introduction to Cryptography|
|Week 7||Network Security|
|Assessment Due: Assignment|
|Week 8||Database Security|
|Week 9||Legal and Ethical issues|
|Week 10||Guest Lecture|
|Assessment Due: Assignment|
|Week 12||Security Management|
|Week 13||Unit of Study Review|
|Exam Period||Assessment Due: Final Exam|
The following is a list of courses which have added this Unit to their structure.
This unit contributes to the achievement of the following course goals:
|Project and Team Skills (Level 2)||No||0%|
|Design (Level 2)||No||0%|
|Engineering/IT Specialisation (Level 2)||Yes||49.36%|
|Maths/Science Methods and Tools (Level 2)||Yes||33.47%|
|Information Seeking (Level 2)||Yes||0%|
|Communication (Level 2)||Yes||0%|
|Professional Conduct (Level 2)||Yes||17.18%|
These goals are selected from Engineering & IT Graduate Outcomes Table which defines overall goals for courses where this unit is primarily offered. See Engineering & IT Graduate Outcomes Table for details of the attributes and levels to be developed in the course as a whole. Percentage figures alongside each course goal provide a rough indication of their relative weighting in assessment for this unit. Note that not all goals are necessarily part of assessment. Some may be more about practice activity. See Learning outcomes for details of what is assessed in relation to each goal and Assessment for details of how the outcome is assessed. See Attributes for details of practice provided for each goal.