Faculty of Health, Engineering and Science
School: Computer and Security Science
This unit information may be updated and amended immediately prior to semester. To ensure you have the correct outline, please check it again at the beginning of semester.
Unit Title
Computer Security
Unit Code
CSI1101
Year
2015
Enrolment Period
1
Version
1
Credit Points
15
Full Year Unit
N
Mode of Delivery
On Campus
Online
Description
This unit covers the threats to computer systems and the countermeasures that can be put in place to minimise them. The areas covered are: aims of computer security and general computer security threats, malicious code including viruses, trojan horses, worms and other forms of hostile executable code. Students also consider the history and fundamental concepts of encryption, current encryption techniques and the social issues that surround the use of such techniques.
Equivalent Rule
Unit was previously coded CSI2201, CSI4102, CSI5122
Learning Outcomes
On completion of this unit students should be able to:
- Discuss the aims of computer security and analyse security breaching attacks in the context of these aims.
- Explain the history of encryption and the application of current forms of encryption, their role in society and the issues that surround their use.
- Explainthe range of surveillance techniques and countermeasures.
- Identify a range of network and Internet related security issues including current types of attacks and appropriate countermeasures.
- Investigate a range of security issues relating to operating systems and PC systems.
- Outlineand develop the skills required to stay informed of current security issues as new attacks and countermeasures continue to be reported.
Unit Content
- Aims of computer security; computer abuse and misuse.
- Current attacks and vulnerabilities including denial of service attacks.
- Current cryptographic techniques and technologies.
- Eavesdropping techniques and countermeasures.
- Encryption fundamentals, including the history of cryptographic techniques and cryptanalysis.
- Encryption techniques used for ensuring authenticity, integrity, non-repudiation and copy-protection.
- Identification, Authentication and Authorisation including passwords, smartcards and biometrics.
- Internet and E-commerce security issues.
- Malicious and hostile code including viruses, trojan horses, worms, backdoors, trapdoors and spyware.
- Network security including firewalls.
- Operating system security, models of security and security evaluation criteria.
- PC security including current security tools.
Additional Learning Experience Information
Lectures, workshops and sets of self-assessment questions.
Assessment
GS1 GRADING SCHEMA 1 Used for standard coursework units
Students please note: The marks and grades received by students on assessments may be subject to further moderation. All marks and grades are to be considered provisional until endorsed by the relevant Board of Examiners.
ON CAMPUSType | Description | Value |
---|
Test | Review test | 5% |
Report | Report on contemporary computer security issues | 20% |
Assignment | Investigation into computer security countermeasures | 25% |
Examination ^ | End of semester examination | 50% |
ONLINEType | Description | Value |
---|
Test | Review test | 5% |
Report | Report on contemporary computer security issues | 20% |
Assignment | Investigation into computer security countermeasures | 25% |
Examination ^ | End of semester examination | 50% |
^ Mandatory to Pass
Text References
- ^ Goodrich, M. T., & Tamassia, R. (2011). Introduction to Computer Security. Boston, MA: Pearson Education.
- Boyle, R., & Panko, R. (2013). Corporate computer security (3rd ed.). Upper Saddle River: Pearson Education.
- Brooks, R. (2014). Introduction to computer and network security. Florida: CRC Press.
- Ciampa, M. (2014). Security Awareness: Applying practical security in your world (4th ed.). Boston, MA: Course Technology.
- Easttom, C. (2012). Computer security fundamentals (2nd ed.). Indianapolis: Pearson.
- Basta, A., Basta, N., & Brown, M. (2014). Computer Security and Penetration Testing (2nd ed.). Boston, MA: Course Technology.
- Gollman, D. (2011). Computer Security (3rd ed.). Chichester, England:John Wiley & Sons.
- Stallings, W., & Brown, L. (2012). Computer Security: Principles and Practice (2nd ed.). Upper Saddle River: Pearson Education.
- Schroeder, S. (2012). The lure. Boston, MA: Course Technology.
Journal References
- Computer Security Journal
- Journal of Information Warfare
- Computers and Security
- Journal of Network Forensics Note: Reference material in this topic area changes very rapidly and for current issues a constant perusal of material on the Internet is required.
^ Mandatory reference
Disability Standards for Education (Commonwealth 2005)
For the purposes of considering a request for Reasonable Adjustments under the Disability Standards for Education (Commonwealth 2005), inherent requirements for this subject are articulated in the Unit Description, Learning Outcomes and Assessment Requirements of this entry. The University is dedicated to provide support to those with special requirements. Further details on the support for students with disabilities or medical conditions can be found at the Access and Inclusion website.
Academic Misconduct
Edith Cowan University has firm rules governing academic misconduct and there are substantial penalties that can be applied to students who are found in breach of these rules. Academic misconduct includes, but is not limited to:
- plagiarism;
- unauthorised collaboration;
- cheating in examinations;
- theft of other students' work;
Additionally, any material submitted for assessment purposes must be work that has not been submitted previously, by any person, for any other unit at ECU or elsewhere.
The ECU rules and policies governing all academic activities, including misconduct, can be accessed through the ECU website.
CSI1101|1|1
Faculty of Health, Engineering and Science
School: Computer and Security Science
This unit information may be updated and amended immediately prior to semester. To ensure you have the correct outline, please check it again at the beginning of semester.
Unit Title
Computer Security
Unit Code
CSI1101
Year
2015
Enrolment Period
2
Version
1
Credit Points
15
Full Year Unit
N
Mode of Delivery
On Campus
Online
Description
This unit covers the threats to computer systems and the countermeasures that can be put in place to minimise them. The areas covered are: aims of computer security and general computer security threats, malicious code including viruses, trojan horses, worms and other forms of hostile executable code. Students also consider the history and fundamental concepts of encryption, current encryption techniques and the social issues that surround the use of such techniques.
Equivalent Rule
Unit was previously coded CSI2201, CSI4102, CSI5122
Learning Outcomes
On completion of this unit students should be able to:
- Discuss the aims of computer security and analyse security breaching attacks in the context of these aims.
- Explain the history of encryption and the application of current forms of encryption, their role in society and the issues that surround their use.
- Explainthe range of surveillance techniques and countermeasures.
- Identify a range of network and Internet related security issues including current types of attacks and appropriate countermeasures.
- Investigate a range of security issues relating to operating systems and PC systems.
- Outlineand develop the skills required to stay informed of current security issues as new attacks and countermeasures continue to be reported.
Unit Content
- Aims of computer security; computer abuse and misuse.
- Current attacks and vulnerabilities including denial of service attacks.
- Current cryptographic techniques and technologies.
- Eavesdropping techniques and countermeasures.
- Encryption fundamentals, including the history of cryptographic techniques and cryptanalysis.
- Encryption techniques used for ensuring authenticity, integrity, non-repudiation and copy-protection.
- Identification, Authentication and Authorisation including passwords, smartcards and biometrics.
- Internet and E-commerce security issues.
- Malicious and hostile code including viruses, trojan horses, worms, backdoors, trapdoors and spyware.
- Network security including firewalls.
- Operating system security, models of security and security evaluation criteria.
- PC security including current security tools.
Additional Learning Experience Information
Lectures, workshops and sets of self-assessment questions.
Assessment
GS1 GRADING SCHEMA 1 Used for standard coursework units
Students please note: The marks and grades received by students on assessments may be subject to further moderation. All marks and grades are to be considered provisional until endorsed by the relevant Board of Examiners.
ON CAMPUSType | Description | Value |
---|
Test | Review test | 5% |
Report | Report on contemporary computer security issues | 20% |
Assignment | Investigation into computer security countermeasures | 25% |
Examination ^ | End of semester examination | 50% |
ONLINEType | Description | Value |
---|
Test | Review test | 5% |
Report | Report on contemporary computer security issues | 20% |
Assignment | Investigation into computer security countermeasures | 25% |
Examination ^ | End of semester examination | 50% |
^ Mandatory to Pass
Text References
- ^ Goodrich, M. T., & Tamassia, R. (2011). Introduction to Computer Security. Boston, MA: Pearson Education.
- Boyle, R., & Panko, R. (2013). Corporate computer security (3rd ed.). Upper Saddle River: Pearson Education.
- Brooks, R. (2014). Introduction to computer and network security. Florida: CRC Press.
- Ciampa, M. (2014). Security Awareness: Applying practical security in your world (4th ed.). Boston, MA: Course Technology.
- Easttom, C. (2012). Computer security fundamentals (2nd ed.). Indianapolis: Pearson.
- Basta, A., Basta, N., & Brown, M. (2014). Computer Security and Penetration Testing (2nd ed.). Boston, MA: Course Technology.
- Gollman, D. (2011). Computer Security (3rd ed.). Chichester, England:John Wiley & Sons.
- Stallings, W., & Brown, L. (2012). Computer Security: Principles and Practice (2nd ed.). Upper Saddle River: Pearson Education.
- Schroeder, S. (2012). The lure. Boston, MA: Course Technology.
Journal References
- Computer Security Journal
- Journal of Information Warfare
- Computers and Security
- Journal of Network Forensics Note: Reference material in this topic area changes very rapidly and for current issues a constant perusal of material on the Internet is required.
^ Mandatory reference
Disability Standards for Education (Commonwealth 2005)
For the purposes of considering a request for Reasonable Adjustments under the Disability Standards for Education (Commonwealth 2005), inherent requirements for this subject are articulated in the Unit Description, Learning Outcomes and Assessment Requirements of this entry. The University is dedicated to provide support to those with special requirements. Further details on the support for students with disabilities or medical conditions can be found at the Access and Inclusion website.
Academic Misconduct
Edith Cowan University has firm rules governing academic misconduct and there are substantial penalties that can be applied to students who are found in breach of these rules. Academic misconduct includes, but is not limited to:
- plagiarism;
- unauthorised collaboration;
- cheating in examinations;
- theft of other students' work;
Additionally, any material submitted for assessment purposes must be work that has not been submitted previously, by any person, for any other unit at ECU or elsewhere.
The ECU rules and policies governing all academic activities, including misconduct, can be accessed through the ECU website.
CSI1101|1|2