Semester 2, 2022 Online | |
Units : | 1 |
Faculty or Section : | Faculty of Business, Education, Law and Arts |
School or Department : | School of Business |
Grading basis : | Graded |
Course fee schedule : | /current-students/administration/fees/fee-schedules |
Staffing
Examiner:
Requisites
Co-requisite: CIS5100
Overview
Information Communications and Technology professionals need to develop a good breadth of knowledge and skills required for the secure management of information technology and communications assets for organisations. Students must have a good working knowledge of the role of information security in providing an appropriate level of confidentiality, integrity and availability for ICT Assets while considering the legal, privacy and ethical implications. Students need to develop the knowledge and skills using a range of security technologies and tools to identify potential threats and vulnerabilities that may exist in business systems and networks and manage security architecture and design and the associated risks and legal, privacy and ethical issues that may rise. This course provides students with an intermediate knowledge of the key principles necessary for managing the security of an organisation's ICT assets including information, information systems and networks.
Students study contemporary information security theory and practice in the context of threats, attacks and vulnerabilities that may exist in relation to organisation's information, communications and technology assets and the controls that can be put in place to ensure that the risks are managed at an acceptable level. Students will develop their skills and knowledge so that they can evaluate information security situations. They will be able to identify specific threats, attacks, vulnerabilities and manage security architecture and design and legal, privacy or ethical issues that may arise. They will be able to clearly communicate and provide advice and guidance to business managers and operational employees to manage the risks identified. Students will be assessed on their understanding of key concepts of information security and their ability to apply and communicate effectively contemporary information security theory and practice to real world problems.
Course learning outcomes
On successful completion of this course students should be able to:
- analyse and evaluate the potential risks associated information security vulnerabilities, attacks and threats and explain how security architecture, design and controls that can be applied to mitigate those potential risks;
- analyse systems and hardware failures and provide advice and guidelines on disaster recovery and business continuity plans for critical recovering information and operational systems;
- evaluate and explain legal privacy and ethical situations to effectively managing information security;
- communicate effectively both written and orally by providing advise and guidance on the risks and technical and people issues associated with management of information security to business managers and operational employees in organisations.
Topics
Description | Weighting(%) | |
---|---|---|
1. | Threats, Attacks and Vulnerabilities | 20.00 |
2. | Security Technologies and Tools | 15.00 |
3. | Security Architecture and Design | 20.00 |
4. | Identity and Access Management | 15.00 |
5. | Risk management | 10.00 |
6. | Cryptography and Public Key Infrastructure | 10.00 |
7. | Legal, privacy and ethical considerations | 10.00 |
Text and materials required to be purchased or accessed
(includes CD.)
Student workload expectations
To do well in this subject, students are expected to commit approximately 10 hours per week including class contact hours, independent study, and all assessment tasks. If you are undertaking additional activities, which may include placements and residential schools, the weekly workload hours may vary.
Assessment details
Description | Group Assessment |
Weighting (%) | Course learning outcomes |
---|---|---|---|
Quiz 1 | No | 10 | 1 |
Report 1 | No | 20 | 3,4 |
Quiz 2 | No | 20 | 2,3 |
Report 2 | No | 50 | 1,2,3,4 |