Note: This unit is an archived version! See Overview tab for delivered versions.
INFO2315: Introduction to IT Security (2017 - Semester 2)
Unit: | INFO2315: Introduction to IT Security (6 CP) |
Mode: | Normal-Day |
On Offer: | Yes |
Level: | Intermediate |
Faculty/School: | School of Computer Science |
Unit Coordinator/s: |
Dr Stavrakakis, John
|
Session options: | Semester 2 |
Versions for this Unit: |
Campus: | Camperdown/Darlington |
Pre-Requisites: | None. |
Brief Handbook Description: | This unit provides a broad introduction to the field of IT security. We examine secure and insecure programs, secure and insecure information, secure and insecure computers, and secure and insecure network infrastructure. Key content includes the main threats to security; how to analyse risks; the role in reducing risk that can be played by technical tools (such as encryption, signatures, access control, firewalls, etc); the limitations of technical defences; and the simple process and behavioural changes that can reduce risk. |
Assumed Knowledge: | In order to enter this unit, students should have at least one semester of tertiary study of IT. In particular, we assume familiarity with the value of information, and with the varied uses of IT in business and personal activities. We also assume an introductory level of skill in using a computer (for example, creating and moving files and folders, downloading and installing files, etc). The assumed background would be achieved by completing INFO1003 Foundations of IT. We also assume previous instruction in verbal presentations and teamwork. |
Lecturer/s: |
Dr Stavrakakis, John
|
||||||||||||||||||||
Tutor/s: |
Alan Robertson Eric Ferguson William Wang Deanna Arora Mahsa Bayat Lina Lau |
||||||||||||||||||||
Timetable: | INFO2315 Timetable | ||||||||||||||||||||
Time Commitment: |
|
||||||||||||||||||||
T&L Activities: | Independent Study: Reading, preparation, study, and completing assignments |
Attributes listed here represent the key course goals (see Course Map tab) designated for this unit. The list below describes how these attributes are developed through practice in the unit. See Learning Outcomes and Assessment tabs for details of how these attributes are assessed.
Attribute Development Method | Attribute Developed |
A broad introduction to the field of IT security. | Engineering/IT Specialisation (Level 2) |
Understanding of the essential concepts of security, and of the fundamentals of computer system organisation (hardware and software components) that impact on security | Maths/Science Methods and Tools (Level 2) |
Gathering and evaluating information from the published literature | Information Seeking (Level 2) |
Producing verbal presentations | Communication (Level 2) |
Practice in teamwork, time management. Awareness of ethical, legal & social issues associated with security. Ability to carry out a risk analysis. |
Professional Conduct (Level 2) |
For explanation of attributes and levels see Engineering & IT Graduate Outcomes Table.
Learning outcomes are the key abilities and knowledge that will be assessed in this unit. They are listed according to the course goal supported by each. See Assessment Tab for details how each outcome is assessed.
Engineering/IT Specialisation (Level 2)Assessment Methods: |
|
||||||||||||||||||||||||||||||||||||||||||
Assessment Description: |
CyberSec challenges: A series of security problems to be completed online. Quiz: Paper examination to test knowledge and skill of weeks 1 - 8. Tutorial pre-work: Small exercise to be completed before all tutorials for the week. Group assignment: Build and test a security software solution. Three deliverables. Attendance: Laboratory participation. Based on weekly attendance and involvement in tutorial discussions. Final Exam: Covers all aspects of the unit of study. It will test the candidates’ knowledge of security concepts, and of particular threats and controls as presented during the semester. Two hours. |
||||||||||||||||||||||||||||||||||||||||||
Grading: |
|
||||||||||||||||||||||||||||||||||||||||||
Policies & Procedures: | IMPORTANT: School policy relating to Academic Dishonesty and Plagiarism. In assessing a piece of submitted work, the School of IT may reproduce it entirely, may provide a copy to another member of faculty, and/or to an external plagiarism checking service or in-house computer program and may also maintain a copy of the assignment for future checking purposes and/or allow an external service to do so. Other policies See the policies page of the faculty website at http://sydney.edu.au/engineering/student-policies/ for information regarding university policies and local provisions and procedures within the Faculty of Engineering and Information Technologies. |
Prescribed Text/s: |
Note: Students are expected to have a personal copy of all books listed.
|
Note that the "Weeks" referred to in this Schedule are those of the official university semester calendar https://web.timetable.usyd.edu.au/calendar.jsp
Week | Description |
Week 1 | Introduction |
Week 2 | Identification |
Week 3 | System Security |
Week 4 | Software Security |
Week 5 | Introduction to Cryptography |
Week 6 | Networks |
Week 7 | Network Security |
Week 8 | Database Security |
Week 9 | Legal and Ethical issues |
Assessment Due: Quiz | |
Week 10 | Guest Lecture |
Week 11 | Privacy |
Week 12 | Security Management |
Week 13 | Unit of Study Review |
Exam Period | Assessment Due: Final Exam |
Course Relations
The following is a list of courses which have added this Unit to their structure.
Course Goals
This unit contributes to the achievement of the following course goals:
Attribute | Practiced | Assessed |
Project and Team Skills (Level 2) | No | 0% |
Design (Level 2) | No | 0% |
Engineering/IT Specialisation (Level 2) | Yes | 50.96% |
Maths/Science Methods and Tools (Level 2) | Yes | 31.67% |
Information Seeking (Level 2) | Yes | 0% |
Communication (Level 2) | Yes | 0% |
Professional Conduct (Level 2) | Yes | 17.38% |
These goals are selected from Engineering & IT Graduate Outcomes Table which defines overall goals for courses where this unit is primarily offered. See Engineering & IT Graduate Outcomes Table for details of the attributes and levels to be developed in the course as a whole. Percentage figures alongside each course goal provide a rough indication of their relative weighting in assessment for this unit. Note that not all goals are necessarily part of assessment. Some may be more about practice activity. See Learning outcomes for details of what is assessed in relation to each goal and Assessment for details of how the outcome is assessed. See Attributes for details of practice provided for each goal.