Course specification for CSC8100

¾«¶«´«Ã½app

USQ Logo
The current and official versions of the course specifications are available on the web at .
Please consult the web for updates that may occur during the year.

CSC8100 Cyber Security Architecture

Semester 1, 2020 On-campus Toowoomba
Short Description: Cyber Security Architecture
Units : 1
Faculty or Section : Faculty of Health, Engineering and Sciences
School or Department : School of Sciences
Student contribution band : Band 2
ASCED code : 020300 - Information Systems
Grading basis : Graded

Staffing

Examiner:

Rationale

The heavy dependence that our economic and government structures have on cyber infrastructure makes them more likely to cyber attack and poses potential threats to infrastructural assets. As cyber threats are becoming more prevalent, so does the need to neutralise them. This course provides students with the fundamentals of cyber security including an over view of the current cyber landscapes, procedures and techniques used and emerging trends.

Synopsis

This course gives students key information regarding the design and management of ICT security within an organisation. Students will consider the fundamental nature of cyber security including protocols to maintain system integrity. The course explores the critical objectives of ICT security, relevant processes and practices and the level of success in achieving these objectives within Australia and world-wide.

Objectives

On successful completion of this course students should be able to:

  1. Analyse the key security objectives of an organisation.
  2. Provide a detailed explanation of the key security practices currently employed within an organisation, including the strengths and limitations of current cyber-security architecture practice and make recommendations to improve security based on emerging trends.
  3. Evaluate and compare the current cyber-security architecture landscape in Australia and other countries, cognisant of its importance, scale and impact.
  4. Define and give a detailed explanation of the range, objectives and techniques employed to undermine cyber security.
  5. Explore important examples where cyber-security is of critical importance and careful implementation of security practises aims to guarantee the integrity of key systems.
  6. Analyse the consequences of a cyber-security failure including the impact on stakeholders and the importance of a thorough investigation in order to improve future practices and protocols.
  7. Explain the special role of money in relation to information security management, and the consequences of this special role for cyber-security.

Topics

Description Weighting(%)
1. Analysis of organisational key security objectives 15.00
2. Methods and procedures for achieving security objectives 15.00
3. Current cyber-security practise in Australia and world-wide 15.00
4. Several examples of key objectives, practices designed to achieve them, and the record of their success are then considered: (I) web-service security, with particular emphasis on the use of certificates to guarantee integrity and authentication and encryption to enforce key cyber-security objectives; (ii) authentication: its role, implementation, and consequences of failure; (iii) privacy of user information; (iv) the management and risks of privileged access; (v) a server farm. 20.00
5. Understanding the enemy: who are the parties seeking to compromise security, what are their objectives? And how do they seek to achieve them? 15.00
6. The special role of money in cyber-security, and how financial transactions need to be managed to minimize the risk of fraud. 10.00
7. Cyber-security failure: both the importance of avoiding it, and how to manage failures when they occur. 10.00

Text and materials required to be purchased or accessed

ALL textbooks and materials available to be purchased can be sourced from (unless otherwise stated). (https://omnia.usq.edu.au/textbooks/?year=2020&sem=01&subject1=CSC8100)

Please for alternative purchase options from USQ Bookshop. (https://omnia.usq.edu.au/info/contact/)

There are no texts or materials required for this course.

Reference materials

Reference materials are materials that, if accessed by students, may improve their knowledge and understanding of the material in the course and enrich their learning experience.

Student workload expectations

Activity Hours
Assessments 55.00
Lectures 26.00
Practical Classes 26.00
Private ¾«¶«´«Ã½app 58.00

Assessment details

Description Marks out of Wtg (%) Due Date Objectives Assessed Notes
Assignment 1 100 20 13 Mar 2020 1,2,3 (see note 1)
Assignment 2 100 20 10 Apr 2020 1,2,3,4,5 (see note 2)
Assignment 3 100 20 01 May 2020 1,2,3,4,5,6,7 (see note 3)
Take Home Exam 100 40 End S1 1,2,3,4,5,6,7 (see note 4)

Notes
  1. An example organisation will be analysed, and a report produced, including an analysis of its key stakeholders, the rules that must apply, for their participation, and a preliminary plan for how this can be achieved.
  2. A series of real-world examples are considered and analysed from the point of view of the methodology learnt up to now. Recommendations for cyber-security practices are to be provided.
  3. A scenario in which an organisation is successfully attacked is explored. A report is prepared which explains how to respond to the attack. The example considered includes financial misappropriation.
  4. This will be an open examination. Students will be provided further instruction regarding the exam by their course examiner via ¾«¶«´«Ã½appDesk. The examination date will be available via UConnect when the official examination timetable has been released.

Important assessment information

  1. Attendance requirements:
    It is the students' responsibility to attend and participate appropriately in all activities scheduled for them, and to study all material provided to them or required to be accessed by them, to maximise their chance of meeting the objectives of the course and to be informed of course-related activities and administration.

  2. Requirements for students to complete each assessment item satisfactorily:
    Due to COVID-19 the requirements for S1 2020 are: To satisfactorily complete an individual assessment item a student must achieve at least 50% of the marks for that item.

    Requirements after S1 2020:
    To satisfactorily complete an individual assessment item a student must achieve at least 50% of the marks for that item.

  3. Penalties for late submission of required work:
    Students should refer to the Assessment Procedure (point 4.2.4)

  4. Requirements for student to be awarded a passing grade in the course:
    Due to COVID-19 the requirements for S1 2020 are: To be assured of receiving a passing grade a student must achieve at least 50% of the total weighted marks available for the course.

    Requirements after S1 2020:
    To be assured of receiving a passing grade a student must obtain at least 50% of the total weighted marks available for the course (i.e. the Primary Hurdle).

  5. Method used to combine assessment results to attain final grade:
    The final grades for students will be assigned on the basis of the aggregate of the weighted marks obtained for each of the summative items for the course.

  6. Examination information:
    Due to COVID-19 the requirements for S1 2020 are: An Open Examination is one in which candidates may have access to any printed or written material and a calculator during the examination

    Requirements after S1 2020:
    RESTRICTED: Candidates are allowed access only to specific materials during a Restricted Examination. The only materials that candidates may use in the restricted examination for this course are:
    • writing materials (non-electronic and free from material which could give the student an unfair advantage in the examination);
    • calculators which cannot hold textual information
    • Students whose first language is not English, may, take an appropriate unmarked non electronic translation dictionary (but not technical dictionary) into the examination.
    • Dictionaries with any handwritten notes will not be permitted. Translation dictionaries will be subject to perusal and may be removed from the candidate’s possession until appropriate disciplinary

  7. Examination period when Deferred/Supplementary examinations will be held:
    Due to COVID-19 the requirements for S1 2020 are: The details regarding deferred/supplementary examinations will be communicated at a later date

    Requirements after S1 2020:
    Any Deferred or Supplementary examinations for this course will be held during the next examination period.

  8. ¾«¶«´«Ã½app Student Policies:
    Students should read the USQ policies: Definitions, Assessment and Student Academic Misconduct to avoid actions which might contravene ¾«¶«´«Ã½app policies and practices. These policies can be found at .

Assessment notes

  1. Referencing in assignments must comply with the Harvard (AGPS) referencing system. This system should be used by students to format details of the information sources they have cited in their work. The Harvard (APGS) style to be used is defined by the USQ library’s referencing guide. This guide can be found at .

Date printed 19 June 2020