School: Science

This unit information may be updated and amended immediately prior to semester. To ensure you have the correct outline, please check it again at the beginning of semester.

  • Unit Title

    Information Security
  • Unit Code

    CSI5133
  • Year

    2016
  • Enrolment Period

    1
  • Version

    1
  • Credit Points

    15
  • Full Year Unit

    N
  • Mode of Delivery

    On Campus
    Online

Description

This unit covers the basic principles and techniques used to protect information. The areas covered are: defining, identifying and classifying information as a resource, access control, information risk analysis, contingency planning, information technology systems, threats to information systems security, data security legislation, database systems and associated security, procedures for secure information flow, classification systems, document and record storage, case studies of information technology systems and abuse including fraud, industrial espionage, confidentiality and privacy breaches, data protection and copyright, and ethical issues associated with information security.

Equivalent Rule

Unit was previously coded CSI2102, CSI4104

Learning Outcomes

On completion of this unit students should be able to:

  1. Analyse and synthesise information security issues in modern organisations.
  2. Demonstrate an understanding of the advantages, disadvantages, threats and vulnerabilities associated with various IT environments.
  3. Demonstrate the concepts, principles and techniques relating to the security of information.
  4. Evaluate the importance of information to organisations and society in general.
  5. Identify the ethical and legal issues associated with information security and analyse their implications.
  6. Identify the role of risk management, risk identification, risk analysis and contingency planning in information security.
  7. Investigate the components of cyberspace and enquire about the security issues associated it.
  8. Review, understand and apply classification systems for information.
  9. Use the Internet to locate information security services.

Unit Content

  1. Case studies covering fraud, software copyright, privacy, identify theft, social engineering, malware and network related based attacks.
  2. Data and information as a resource including classification, access and transmission controls. A working definition of data, information, and knowledge.
  3. Data protection and privacy, copyright, ownership principles, ethical and legal aspects. Data Protection Acts in Australia, UK, US, and Europe.
  4. Document security, cryptography and encryption principles, physical security, physical protection, archive, retrieval, and classification systems.
  5. Information management. Access, identification, authorisation controls. Ensuring availability, accuracy, integrity and confidentiality of information.
  6. Logical protection of computer and information systems.
  7. Monitoring security of information and information flow. Security intelligence systems.
  8. Risk analysis, risk assessment and contingency planning for information security. Risk management. Impact and probability of threat.
  9. The differences and similarities between computer and information security.
  10. Use of the Internet as an information resource. Examination of security issues in cyberspace. Management of incidents: detection, identification of intruder, response, reporting, and change process.

Additional Learning Experience Information

Lectures, workshops, use of the Internet. All lectures are available as audio and written materials.

Assessment

GS1 GRADING SCHEMA 1 Used for standard coursework units

Students please note: The marks and grades received by students on assessments may be subject to further moderation. All marks and grades are to be considered provisional until endorsed by the relevant Board of Examiners.

ON CAMPUS
TypeDescriptionValue
AssignmentReport on information security issues20%
AssignmentReport on information security countermeasures and solutions30%
Examination ^End of semester examination50%
ONLINE
TypeDescriptionValue
AssignmentReport on information security issues20%
AssignmentReport on information security countermeasures and solutions30%
Examination ^End of semester examination50%

^ Mandatory to Pass

Text References

  • ^ Whitman, M.E., & Mattord, H.J. (2012). Principles of information security (4th ed.). Boston, MA: Thomson Educational.
  • Whitman, M, E., & Mattord, H, J. (2010). Management of information security. Course Technology: Cengage Learning.
  • Whitman, M, E., Mattord, H, J., & Green, A. (2013). Principles of incident response & disaster recovery. Course Technology: Cengage Learning.
  • Merkow, M., & Breithaupt, J. (2005). Information security: Principles and practices. Pearson: Prentice Hall.

Journal References

  • Security Surveyor
  • Security Australia
  • Security
  • Security Management
  • Computer Security Journal
  • Computers and Security
  • Computer Fraud and Security Bulletin
  • Journal of Information Warfare
  • Security Gazette

^ Mandatory reference


Disability Standards for Education (Commonwealth 2005)

For the purposes of considering a request for Reasonable Adjustments under the Disability Standards for Education (Commonwealth 2005), inherent requirements for this subject are articulated in the Unit Description, Learning Outcomes and Assessment Requirements of this entry. The University is dedicated to provide support to those with special requirements. Further details on the support for students with disabilities or medical conditions can be found at the Access and Inclusion website.

Academic Misconduct

Edith Cowan University has firm rules governing academic misconduct and there are substantial penalties that can be applied to students who are found in breach of these rules. Academic misconduct includes, but is not limited to:

  • plagiarism;
  • unauthorised collaboration;
  • cheating in examinations;
  • theft of other students' work;

Additionally, any material submitted for assessment purposes must be work that has not been submitted previously, by any person, for any other unit at ECU or elsewhere.

The ECU rules and policies governing all academic activities, including misconduct, can be accessed through the ECU website.

CSI5133|1|1

School: Science

This unit information may be updated and amended immediately prior to semester. To ensure you have the correct outline, please check it again at the beginning of semester.

  • Unit Title

    Information Security
  • Unit Code

    CSI5133
  • Year

    2016
  • Enrolment Period

    2
  • Version

    1
  • Credit Points

    15
  • Full Year Unit

    N
  • Mode of Delivery

    On Campus
    Online

Description

This unit covers the basic principles and techniques used to protect information. The areas covered are: defining, identifying and classifying information as a resource, access control, information risk analysis, contingency planning, information technology systems, threats to information systems security, data security legislation, database systems and associated security, procedures for secure information flow, classification systems, document and record storage, case studies of information technology systems and abuse including fraud, industrial espionage, confidentiality and privacy breaches, data protection and copyright, and ethical issues associated with information security.

Equivalent Rule

Unit was previously coded CSI2102, CSI4104

Learning Outcomes

On completion of this unit students should be able to:

  1. Analyse and synthesise information security issues in modern organisations.
  2. Demonstrate an understanding of the advantages, disadvantages, threats and vulnerabilities associated with various IT environments.
  3. Demonstrate the concepts, principles and techniques relating to the security of information.
  4. Evaluate the importance of information to organisations and society in general.
  5. Identify the ethical and legal issues associated with information security and analyse their implications.
  6. Identify the role of risk management, risk identification, risk analysis and contingency planning in information security.
  7. Investigate the components of cyberspace and enquire about the security issues associated it.
  8. Review, understand and apply classification systems for information.
  9. Use the Internet to locate information security services.

Unit Content

  1. Case studies covering fraud, software copyright, privacy, identify theft, social engineering, malware and network related based attacks.
  2. Data and information as a resource including classification, access and transmission controls. A working definition of data, information, and knowledge.
  3. Data protection and privacy, copyright, ownership principles, ethical and legal aspects. Data Protection Acts in Australia, UK, US, and Europe.
  4. Document security, cryptography and encryption principles, physical security, physical protection, archive, retrieval, and classification systems.
  5. Information management. Access, identification, authorisation controls. Ensuring availability, accuracy, integrity and confidentiality of information.
  6. Logical protection of computer and information systems.
  7. Monitoring security of information and information flow. Security intelligence systems.
  8. Risk analysis, risk assessment and contingency planning for information security. Risk management. Impact and probability of threat.
  9. The differences and similarities between computer and information security.
  10. Use of the Internet as an information resource. Examination of security issues in cyberspace. Management of incidents: detection, identification of intruder, response, reporting, and change process.

Additional Learning Experience Information

Lectures, workshops, use of the Internet. All lectures are available as audio and written materials.

Assessment

GS1 GRADING SCHEMA 1 Used for standard coursework units

Students please note: The marks and grades received by students on assessments may be subject to further moderation. All marks and grades are to be considered provisional until endorsed by the relevant Board of Examiners.

ON CAMPUS
TypeDescriptionValue
AssignmentReport on information security issues20%
AssignmentReport on information security countermeasures and solutions30%
Examination ^End of semester examination50%
ONLINE
TypeDescriptionValue
AssignmentReport on information security issues20%
AssignmentReport on information security countermeasures and solutions30%
Examination ^End of semester examination50%

^ Mandatory to Pass

Text References

  • ^ Whitman, M.E., & Mattord, H.J. (2012). Principles of information security (4th ed.). Boston, MA: Thomson Educational.
  • Merkow, M., & Breithaupt, J. (2005). Information security: Principles and practices. Pearson: Prentice Hall.
  • Whitman, M, E., & Mattord, H, J. (2010). Management of information security. Course Technology: Cengage Learning.
  • Whitman, M, E., Mattord, H, J., & Green, A. (2013). Principles of incident response & disaster recovery. Course Technology: Cengage Learning.

Journal References

  • Computers and Security
  • Computer Security Journal
  • Security Surveyor
  • Security Gazette
  • Computer Fraud and Security Bulletin
  • Security Australia
  • Security
  • Security Management
  • Journal of Information Warfare

^ Mandatory reference


Disability Standards for Education (Commonwealth 2005)

For the purposes of considering a request for Reasonable Adjustments under the Disability Standards for Education (Commonwealth 2005), inherent requirements for this subject are articulated in the Unit Description, Learning Outcomes and Assessment Requirements of this entry. The University is dedicated to provide support to those with special requirements. Further details on the support for students with disabilities or medical conditions can be found at the Access and Inclusion website.

Academic Misconduct

Edith Cowan University has firm rules governing academic misconduct and there are substantial penalties that can be applied to students who are found in breach of these rules. Academic misconduct includes, but is not limited to:

  • plagiarism;
  • unauthorised collaboration;
  • cheating in examinations;
  • theft of other students' work;

Additionally, any material submitted for assessment purposes must be work that has not been submitted previously, by any person, for any other unit at ECU or elsewhere.

The ECU rules and policies governing all academic activities, including misconduct, can be accessed through the ECU website.

CSI5133|1|2