Faculty of Health, Engineering and Science

School: Computer and Security Science

This unit information may be updated and amended immediately prior to semester. To ensure you have the correct outline, please check it again at the beginning of semester.

  • Unit Title

    Computer Facilities Security
  • Unit Code

    CSI3301
  • Year

    2015
  • Enrolment Period

    1
  • Version

    1
  • Credit Points

    15
  • Full Year Unit

    N
  • Mode of Delivery

    On Campus

Description

This unit covers the principles and techniques of security as they apply to computer facilities and environments. The unit examines the application of security principles to the computer environment for the protection of personnel, systems and information. Unit content includes physical security, secure facility communications, system survivability and fault tolerance, emissions security, backup strategies and redundancy, infrastructure protection, business continuity and disaster recovery planning change management as well as legal and ethical issues.

Prerequisite Rule

Students must pass 1 unit from CSI1101

Equivalent Rule

Unit was previously coded CSI4205, CSI5209

Learning Outcomes

On completion of this unit students should be able to:

  1. Analyse the current security state of a computing facility, identify risks, threats and compliance, and recommend appropriate security measures.
  2. Apply principles and theory to given situations taking into account legal and ethical issues.
  3. Assess the reliance of a computing facility on external infrastructure.
  4. Communicate issues relating to the security of computing facilities in an effective, professional manner.
  5. Evaluate technologies for securing computing environments.
  6. Plan for secure computing environments.
  7. Recommend measures to ensure system survivability and business continuity in the event of disruption.
  8. Recommend measures to protect infrastructure provided to others.

Unit Content

  1. Backup strategies and data protection.
  2. Business continuity planning.
  3. Disaster recovery planning.
  4. Overview of current computer facility security issues.
  5. Physical, facility and environmental security.
  6. Secure facility communication.
  7. Standard operating environments and change management.
  8. System survivability.

Additional Learning Experience Information

Lectures, tutorials and activities, self assessment tests and participation in discussion forums.

Assessment

GS1 GRADING SCHEMA 1 Used for standard coursework units

Students please note: The marks and grades received by students on assessments may be subject to further moderation. All marks and grades are to be considered provisional until endorsed by the relevant Board of Examiners.

ON CAMPUS
TypeDescriptionValue
AssignmentTechnical Report20%
Case StudyCase study of an IT enabled organisation40%
ExaminationEnd of semester examination40%
ONLINE
TypeDescriptionValue
AssignmentTechnical Report20%
Case StudyCase study of an IT enabled organisation40%
ExaminationEnd of semester examination40%

Text References

  • ^ Whitman, M., & Mattord, H. (2007). Principles of incident response and disaster recovery. Sydney: Thompson Course Technology.
  • Erbschloe, M. (2003). Guide to disaster recovery. Boston: Course Technology.
  • Pfleeger, C., Pfleeger, S. (2007). Security in computing (4th ed.). New Jersey: Prentice-Hall .
  • Schneier, B. (2000). Secrets and lies: Digital security in a networked world. New York: Wiley & Sons.
  • Schneier, B. (2003). Beyond fear: Thinking sensibly about security in an uncertain world. New York: Copernicus Books.
  • POA Publishing. (2003). Asset protection and security management handbook. Boca Raton: Auerbach Publications.
  • Toigo, J. (2003). Disaster recovery planning: Preparing for the unthinkable. New Jersey: Prentice Hall.
  • Verton, D. (2003). Black ice: The invisible threat of cyber-terrorism. Emeryville: McGraw-Hill/Osborne.
  • Gollmann, D. (2006). Computer security (2nd ed.). New York: Wiley & Sons.
  • Mitnick, K. (2002). The art of deception: Controlling the human element of security. Indianapolis: John Wiley & Sons.
  • Bishop, M. (2003). Computer security: Art and science. Boston: Pearson Education.

Journal References

  • Journal of Information Warfare
  • Computer Security Journal
  • Security Gazette
  • Security Management
  • Security Australia
  • The CPTED Journal
  • Computers and Security
  • Security
  • Security Surveyor

Website References

^ Mandatory reference


Disability Standards for Education (Commonwealth 2005)

For the purposes of considering a request for Reasonable Adjustments under the Disability Standards for Education (Commonwealth 2005), inherent requirements for this subject are articulated in the Unit Description, Learning Outcomes and Assessment Requirements of this entry. The University is dedicated to provide support to those with special requirements. Further details on the support for students with disabilities or medical conditions can be found at the Access and Inclusion website.

Academic Misconduct

Edith Cowan University has firm rules governing academic misconduct and there are substantial penalties that can be applied to students who are found in breach of these rules. Academic misconduct includes, but is not limited to:

  • plagiarism;
  • unauthorised collaboration;
  • cheating in examinations;
  • theft of other students' work;

Additionally, any material submitted for assessment purposes must be work that has not been submitted previously, by any person, for any other unit at ECU or elsewhere.

The ECU rules and policies governing all academic activities, including misconduct, can be accessed through the ECU website.

CSI3301|1|1

Faculty of Health, Engineering and Science

School: Computer and Security Science

This unit information may be updated and amended immediately prior to semester. To ensure you have the correct outline, please check it again at the beginning of semester.

  • Unit Title

    Computer Facilities Security
  • Unit Code

    CSI3301
  • Year

    2015
  • Enrolment Period

    2
  • Version

    1
  • Credit Points

    15
  • Full Year Unit

    N
  • Mode of Delivery

    On Campus

Description

This unit covers the principles and techniques of security as they apply to computer facilities and environments. The unit examines the application of security principles to the computer environment for the protection of personnel, systems and information. Unit content includes physical security, secure facility communications, system survivability and fault tolerance, emissions security, backup strategies and redundancy, infrastructure protection, business continuity and disaster recovery planning change management as well as legal and ethical issues.

Prerequisite Rule

Students must pass 1 unit from CSI1101

Equivalent Rule

Unit was previously coded CSI4205, CSI5209

Learning Outcomes

On completion of this unit students should be able to:

  1. Analyse the current security state of a computing facility, identify risks, threats and compliance, and recommend appropriate security measures.
  2. Apply principles and theory to given situations taking into account legal and ethical issues.
  3. Assess the reliance of a computing facility on external infrastructure.
  4. Communicate issues relating to the security of computing facilities in an effective, professional manner.
  5. Evaluate technologies for securing computing environments.
  6. Plan for secure computing environments.
  7. Recommend measures to ensure system survivability and business continuity in the event of disruption.
  8. Recommend measures to protect infrastructure provided to others.

Unit Content

  1. Backup strategies and data protection.
  2. Business continuity planning.
  3. Disaster recovery planning.
  4. Overview of current computer facility security issues.
  5. Physical, facility and environmental security.
  6. Secure facility communication.
  7. Standard operating environments and change management.
  8. System survivability.

Additional Learning Experience Information

Lectures, tutorials and activities, self assessment tests and participation in discussion forums.

Assessment

GS1 GRADING SCHEMA 1 Used for standard coursework units

Students please note: The marks and grades received by students on assessments may be subject to further moderation. All marks and grades are to be considered provisional until endorsed by the relevant Board of Examiners.

ON CAMPUS
TypeDescriptionValue
AssignmentTechnical Report20%
Case StudyCase study of an IT enabled organisation40%
ExaminationEnd of semester examination40%
ONLINE
TypeDescriptionValue
AssignmentTechnical Report20%
Case StudyCase study of an IT enabled organisation40%
ExaminationEnd of semester examination40%

Text References

  • ^ Whitman, M., & Mattord, H. (2007). Principles of incident response and disaster recovery. Sydney: Thompson Course Technology.
  • Erbschloe, M. (2003). Guide to disaster recovery. Boston: Course Technology.
  • Pfleeger, C., Pfleeger, S. (2007). Security in computing (4th ed.). New Jersey: Prentice-Hall .
  • Schneier, B. (2000). Secrets and lies: Digital security in a networked world. New York: Wiley & Sons.
  • Schneier, B. (2003). Beyond fear: Thinking sensibly about security in an uncertain world. New York: Copernicus Books.
  • POA Publishing. (2003). Asset protection and security management handbook. Boca Raton: Auerbach Publications.
  • Toigo, J. (2003). Disaster recovery planning: Preparing for the unthinkable. New Jersey: Prentice Hall.
  • Verton, D. (2003). Black ice: The invisible threat of cyber-terrorism. Emeryville: McGraw-Hill/Osborne.
  • Gollmann, D. (2006). Computer security (2nd ed.). New York: Wiley & Sons.
  • Mitnick, K. (2002). The art of deception: Controlling the human element of security. Indianapolis: John Wiley & Sons.
  • Bishop, M. (2003). Computer security: Art and science. Boston: Pearson Education.

Journal References

  • Journal of Information Warfare
  • Computer Security Journal
  • Security Gazette
  • Security Management
  • Security Australia
  • The CPTED Journal
  • Computers and Security
  • Security
  • Security Surveyor

Website References

^ Mandatory reference


Disability Standards for Education (Commonwealth 2005)

For the purposes of considering a request for Reasonable Adjustments under the Disability Standards for Education (Commonwealth 2005), inherent requirements for this subject are articulated in the Unit Description, Learning Outcomes and Assessment Requirements of this entry. The University is dedicated to provide support to those with special requirements. Further details on the support for students with disabilities or medical conditions can be found at the Access and Inclusion website.

Academic Misconduct

Edith Cowan University has firm rules governing academic misconduct and there are substantial penalties that can be applied to students who are found in breach of these rules. Academic misconduct includes, but is not limited to:

  • plagiarism;
  • unauthorised collaboration;
  • cheating in examinations;
  • theft of other students' work;

Additionally, any material submitted for assessment purposes must be work that has not been submitted previously, by any person, for any other unit at ECU or elsewhere.

The ECU rules and policies governing all academic activities, including misconduct, can be accessed through the ECU website.

CSI3301|1|2