Faculty of Health, Engineering and Science
School: Computer and Security Science
This unit information may be updated and amended immediately prior to semester. To ensure you have the correct outline, please check it again at the beginning of semester.
Unit Title
Computer Security
Unit Code
CSI5122
Year
2015
Enrolment Period
1
Version
2
Credit Points
15
Full Year Unit
N
Mode of Delivery
On Campus
Online
Description
This unit covers the threats to computer systems and the countermeasures that can be put in place to minimise these. The unit covers a wide range of security issues and concepts from authentication and encryption through to network threats and password management. Students will examine computer security issues from the perspective of detecting threats and implementing secure computing environments.
Equivalent Rule
Unit was previously coded CSI1101, CSI4102
Learning Outcomes
On completion of this unit students should be able to:
- Identify a range of network and Internet related security issues including current types of attacks and appropriate countermeasures.
- Identify the range of surveillance techniques and countermeasures.
- Investigate a range of security issues relating to operating systems and PC systems, including threats, vulnerabilities and security mechanisms.
- Investigate the aims of computer security and analyse security breaching attacks in the context of these aims.
- Research and develop the skills required to stay informed of current security issues as new attacks and countermeasures continue to be reported.
- Understand the history of encryption and the application of current forms of encryption, their role in society and the issues that surround their use.
- Understand the importance of the concepts of identification, authentication and authorisation.
Unit Content
- Aims of computer security; computer abuse and misuse.
- Current attacks and vulnerabilities including denial of service attacks.
- Current cryptographic techniques and technologies.
- Eavesdropping techniques and countermeasures.
- Encryption fundamentals, including the history of cryptographic techniques and cryptanalysis.
- Encryption techniques used for ensuring authenticity, integrity, non-repudiation and copy-protection.
- Identification, authentication and authorisation including passwords, smartcards and biometrics.
- Internet and E-commerce security issues.
- Malicious and hostile code including viruses, trojan horses, worms, backdoors, trapdoors and spyware.
- Network security including firewalls.
- Operating system security, models of security and security evaluation criteria.
- PC security including current security tools.
Additional Learning Experience Information
Lectures,audio and video recordings,workshops and activities, together with self-assessment activities.
Assessment
GS1 GRADING SCHEMA 1 Used for standard coursework units
Students please note: The marks and grades received by students on assessments may be subject to further moderation. All marks and grades are to be considered provisional until endorsed by the relevant Board of Examiners.
ON CAMPUSType | Description | Value |
---|
Test | Review test | 5% |
Report | Report on contemporary computer security issues | 20% |
Assignment | Investigation into computer security countermeasures | 25% |
Examination ^ | End of semester examination | 50% |
ONLINEType | Description | Value |
---|
Test | Review test | 5% |
Report | Report on contemporary computer security issues | 20% |
Assignment | Investigation into computer security countermeasures | 25% |
Examination ^ | End of semester examination | 50% |
^ Mandatory to Pass
Text References
- ^ Goodrich, M. T., & Tamassia, R. (2011). Introduction to Computer Security. Boston, MA: Pearson Education.
- Basta, A., Basta, N., & Brown, M. (2014). Computer Security and Penetration Testing (2nd ed.). Boston, MA: Course Technology.
- Stallings, W., & Brown, L. (2012). Computer security principles and practice (2nd ed.). Upper Saddle River: Pearson.
- Stallings, W. (2011). Cryptography and network security principles and practice (5th ed.). Upper Saddle River: Pearson.
- Schroeder, S. (2012). The lure. Boston, MA: Course Technology.
- Gollman, D. (2011). Computer Security (3rd ed.). Chichester, England: John Wiley & Sons.
- Easttom, C. (2012). Computer security fundamentals (2nd ed.). Indianapolis: Pearson.
- Ciampa, M. (2014). Security awareness: Applying practical security in your world (4th ed.). Boston, MA: Course Technology.
- Boyle, R., & Panko, R. (2013). Corporate Computer Security (3rd ed.). Upper Saddle River: Pearson Education
- Brooks, R. (2014). Introduction to computer and network security. Florida: CRC Press.
Journal References
- Journal of Information Warfare
- Computers and Security
- Computer Security Journal
- Computer Crime Digest Note: Note: Reference material in this topic area changes very rapidly and for current issues a constant perusal of material on the Internet is required.
- Security Australia
- Journal of Network Forensics
- Security Management
^ Mandatory reference
Disability Standards for Education (Commonwealth 2005)
For the purposes of considering a request for Reasonable Adjustments under the Disability Standards for Education (Commonwealth 2005), inherent requirements for this subject are articulated in the Unit Description, Learning Outcomes and Assessment Requirements of this entry. The University is dedicated to provide support to those with special requirements. Further details on the support for students with disabilities or medical conditions can be found at the Access and Inclusion website.
Academic Misconduct
Edith Cowan University has firm rules governing academic misconduct and there are substantial penalties that can be applied to students who are found in breach of these rules. Academic misconduct includes, but is not limited to:
- plagiarism;
- unauthorised collaboration;
- cheating in examinations;
- theft of other students' work;
Additionally, any material submitted for assessment purposes must be work that has not been submitted previously, by any person, for any other unit at ECU or elsewhere.
The ECU rules and policies governing all academic activities, including misconduct, can be accessed through the ECU website.
CSI5122|2|1
Faculty of Health, Engineering and Science
School: Computer and Security Science
This unit information may be updated and amended immediately prior to semester. To ensure you have the correct outline, please check it again at the beginning of semester.
Unit Title
Computer Security
Unit Code
CSI5122
Year
2015
Enrolment Period
2
Version
2
Credit Points
15
Full Year Unit
N
Mode of Delivery
On Campus
Online
Description
This unit covers the threats to computer systems and the countermeasures that can be put in place to minimise these. The unit covers a wide range of security issues and concepts from authentication and encryption through to network threats and password management. Students will examine computer security issues from the perspective of detecting threats and implementing secure computing environments.
Equivalent Rule
Unit was previously coded CSI1101, CSI4102
Learning Outcomes
On completion of this unit students should be able to:
- Identify a range of network and Internet related security issues including current types of attacks and appropriate countermeasures.
- Identify the range of surveillance techniques and countermeasures.
- Investigate a range of security issues relating to operating systems and PC systems, including threats, vulnerabilities and security mechanisms.
- Investigate the aims of computer security and analyse security breaching attacks in the context of these aims.
- Research and develop the skills required to stay informed of current security issues as new attacks and countermeasures continue to be reported.
- Understand the history of encryption and the application of current forms of encryption, their role in society and the issues that surround their use.
- Understand the importance of the concepts of identification, authentication and authorisation.
Unit Content
- Aims of computer security; computer abuse and misuse.
- Current attacks and vulnerabilities including denial of service attacks.
- Current cryptographic techniques and technologies.
- Eavesdropping techniques and countermeasures.
- Encryption fundamentals, including the history of cryptographic techniques and cryptanalysis.
- Encryption techniques used for ensuring authenticity, integrity, non-repudiation and copy-protection.
- Identification, authentication and authorisation including passwords, smartcards and biometrics.
- Internet and E-commerce security issues.
- Malicious and hostile code including viruses, trojan horses, worms, backdoors, trapdoors and spyware.
- Network security including firewalls.
- Operating system security, models of security and security evaluation criteria.
- PC security including current security tools.
Additional Learning Experience Information
Lectures,audio and video recordings,workshops and activities, together with self-assessment activities.
Assessment
GS1 GRADING SCHEMA 1 Used for standard coursework units
Students please note: The marks and grades received by students on assessments may be subject to further moderation. All marks and grades are to be considered provisional until endorsed by the relevant Board of Examiners.
ON CAMPUSType | Description | Value |
---|
Test | Review test | 5% |
Report | Report on contemporary computer security issues | 20% |
Assignment | Investigation into computer security countermeasures | 25% |
Examination ^ | End of semester examination | 50% |
ONLINEType | Description | Value |
---|
Test | Review test | 5% |
Report | Report on contemporary computer security issues | 20% |
Assignment | Investigation into computer security countermeasures | 25% |
Examination ^ | End of semester examination | 50% |
^ Mandatory to Pass
Text References
- ^ Goodrich, M. T., & Tamassia, R. (2011). Introduction to Computer Security. Boston, MA: Pearson Education.
- Basta, A., Basta, N., & Brown, M. (2014). Computer Security and Penetration Testing (2nd ed.). Boston, MA: Course Technology.
- Stallings, W., & Brown, L. (2012). Computer security principles and practice (2nd ed.). Upper Saddle River: Pearson.
- Stallings, W. (2011). Cryptography and network security principles and practice (5th ed.). Upper Saddle River: Pearson.
- Schroeder, S. (2012). The lure. Boston, MA: Course Technology.
- Gollman, D. (2011). Computer Security (3rd ed.). Chichester, England: John Wiley & Sons.
- Easttom, C. (2012). Computer security fundamentals (2nd ed.). Indianapolis: Pearson.
- Ciampa, M. (2014). Security awareness: Applying practical security in your world (4th ed.). Boston, MA: Course Technology.
- Boyle, R., & Panko, R. (2013). Corporate Computer Security (3rd ed.). Upper Saddle River: Pearson Education
- Brooks, R. (2014). Introduction to computer and network security. Florida: CRC Press.
Journal References
- Journal of Information Warfare
- Computers and Security
- Computer Security Journal
- Computer Crime Digest Note: Note: Reference material in this topic area changes very rapidly and for current issues a constant perusal of material on the Internet is required.
- Security Australia
- Journal of Network Forensics
- Security Management
^ Mandatory reference
Disability Standards for Education (Commonwealth 2005)
For the purposes of considering a request for Reasonable Adjustments under the Disability Standards for Education (Commonwealth 2005), inherent requirements for this subject are articulated in the Unit Description, Learning Outcomes and Assessment Requirements of this entry. The University is dedicated to provide support to those with special requirements. Further details on the support for students with disabilities or medical conditions can be found at the Access and Inclusion website.
Academic Misconduct
Edith Cowan University has firm rules governing academic misconduct and there are substantial penalties that can be applied to students who are found in breach of these rules. Academic misconduct includes, but is not limited to:
- plagiarism;
- unauthorised collaboration;
- cheating in examinations;
- theft of other students' work;
Additionally, any material submitted for assessment purposes must be work that has not been submitted previously, by any person, for any other unit at ECU or elsewhere.
The ECU rules and policies governing all academic activities, including misconduct, can be accessed through the ECU website.
CSI5122|2|2