Faculty of Health, Engineering and Science

School: Computer and Security Science

This unit information may be updated and amended immediately prior to semester. To ensure you have the correct outline, please check it again at the beginning of semester.

  • Unit Title

    Wireless and Mobile Computing Security
  • Unit Code

    CSI6218
  • Year

    2015
  • Enrolment Period

    1
  • Version

    1
  • Credit Points

    20
  • Full Year Unit

    N
  • Mode of Delivery

    On Campus
    Online

Description

This unit is an introduction to wireless and mobile computing security. The unit will focus on securing wireless services, mobile devices including computer laptops, handheld computers, Personal Digital Assistants and portable flash memory devices. Students will be exposed to a wide range of techniques, tools and policy to protect a wireless or mobile computing environment.

Prerequisite Rule

Students must pass 2 units from CSI4102, CSI4207

Equivalent Rule

Unit was previously coded CSI5318

Learning Outcomes

On completion of this unit students should be able to:

  1. Apply appropriate security tools and techniques to protect a mobile and wireless computing environment.
  2. Communicate on special security issues associated with wireless and mobile computing.
  3. Evaluate a mobile computing environment for security considerations including design and implementation of policy.
  4. Evaluate current wireless and mobile computing security issues.
  5. Reflect on the current legal position and how it relates to the security management issues of wireless and mobile computing.
  6. Research wireless and mobile computing and related security problems.

Unit Content

  1. Legal issues.
  2. Mobile application security.
  3. Mobile device forensics.
  4. Mobile device management.
  5. Mobile device security policies.
  6. Threats to mobile data.
  7. Wireless Intrusion Detection Systems.
  8. Wireless Intrusion Prevention Systems.
  9. Wireless vulnerabilities.

Additional Learning Experience Information

Lectures, workshops, case studies and practical exercises.

Assessment

GS1 GRADING SCHEMA 1 Used for standard coursework units

Students please note: The marks and grades received by students on assessments may be subject to further moderation. All marks and grades are to be considered provisional until endorsed by the relevant Board of Examiners.

ON CAMPUS
TypeDescriptionValue
Case StudyIndustry Related Case Study40%
Research PaperCurrent Topic in Wireless Security40%
WorkshopCumulative Assessable Workshops20%
ONLINE
TypeDescriptionValue
Case StudyIndustry Related Case Study40%
Research PaperCurrent Topic in Wireless Security40%
WorkshopCumulative Assessable Workshops20%

Text References

  • Ramachandran, V. (2011). BackTrack 5 wireless penetration testing. Birmingham: Packt Publishing.
  • Cache, J., Wright, J., & Liu, V. (2010). Hacking exposed wireless (2nd ed.). New York: McGraw-Hill Osborne Media.

Journal References

  • Computers and Security
  • Journal of Information Warfare
  • Security Australia
  • Security Management
  • Security Systems Digest
  • Virus Bulletin
  • Computer Security Journal
  • Computer Crime Digest
  • Security

Disability Standards for Education (Commonwealth 2005)

For the purposes of considering a request for Reasonable Adjustments under the Disability Standards for Education (Commonwealth 2005), inherent requirements for this subject are articulated in the Unit Description, Learning Outcomes and Assessment Requirements of this entry. The University is dedicated to provide support to those with special requirements. Further details on the support for students with disabilities or medical conditions can be found at the Access and Inclusion website.

Academic Misconduct

Edith Cowan University has firm rules governing academic misconduct and there are substantial penalties that can be applied to students who are found in breach of these rules. Academic misconduct includes, but is not limited to:

  • plagiarism;
  • unauthorised collaboration;
  • cheating in examinations;
  • theft of other students' work;

Additionally, any material submitted for assessment purposes must be work that has not been submitted previously, by any person, for any other unit at ECU or elsewhere.

The ECU rules and policies governing all academic activities, including misconduct, can be accessed through the ECU website.

CSI6218|1|1

Faculty of Health, Engineering and Science

School: Computer and Security Science

This unit information may be updated and amended immediately prior to semester. To ensure you have the correct outline, please check it again at the beginning of semester.

  • Unit Title

    Wireless and Mobile Computing Security
  • Unit Code

    CSI6218
  • Year

    2015
  • Enrolment Period

    2
  • Version

    1
  • Credit Points

    20
  • Full Year Unit

    N
  • Mode of Delivery

    On Campus
    Online

Description

This unit is an introduction to wireless and mobile computing security. The unit will focus on securing wireless services, mobile devices including computer laptops, handheld computers, Personal Digital Assistants and portable flash memory devices. Students will be exposed to a wide range of techniques, tools and policy to protect a wireless or mobile computing environment.

Prerequisite Rule

Students must pass 2 units from CSI4102, CSI4207

Equivalent Rule

Unit was previously coded CSI5318

Learning Outcomes

On completion of this unit students should be able to:

  1. Apply appropriate security tools and techniques to protect a mobile and wireless computing environment.
  2. Communicate on special security issues associated with wireless and mobile computing.
  3. Evaluate a mobile computing environment for security considerations including design and implementation of policy.
  4. Evaluate current wireless and mobile computing security issues.
  5. Reflect on the current legal position and how it relates to the security management issues of wireless and mobile computing.
  6. Research wireless and mobile computing and related security problems.

Unit Content

  1. Legal issues.
  2. Mobile application security.
  3. Mobile device forensics.
  4. Mobile device management.
  5. Mobile device security policies.
  6. Threats to mobile data.
  7. Wireless Intrusion Detection Systems.
  8. Wireless Intrusion Prevention Systems.
  9. Wireless vulnerabilities.

Additional Learning Experience Information

Lectures, workshops, case studies and practical exercises.

Assessment

GS1 GRADING SCHEMA 1 Used for standard coursework units

Students please note: The marks and grades received by students on assessments may be subject to further moderation. All marks and grades are to be considered provisional until endorsed by the relevant Board of Examiners.

ON CAMPUS
TypeDescriptionValue
Case StudyIndustry Related Case Study40%
Research PaperCurrent Topic in Wireless Security40%
WorkshopCumulative Assessable Workshops20%
ONLINE
TypeDescriptionValue
Case StudyIndustry Related Case Study40%
Research PaperCurrent Topic in Wireless Security40%
WorkshopCumulative Assessable Workshops20%

Text References

  • Ramachandran, V. (2011). BackTrack 5 wireless penetration testing. Birmingham: Packt Publishing.
  • Cache, J., Wright, J., & Liu, V. (2010). Hacking exposed wireless (2nd ed.). New York: McGraw-Hill Osborne Media.

Journal References

  • Computers and Security
  • Journal of Information Warfare
  • Security Australia
  • Security Management
  • Security Systems Digest
  • Virus Bulletin
  • Computer Security Journal
  • Computer Crime Digest
  • Security

Disability Standards for Education (Commonwealth 2005)

For the purposes of considering a request for Reasonable Adjustments under the Disability Standards for Education (Commonwealth 2005), inherent requirements for this subject are articulated in the Unit Description, Learning Outcomes and Assessment Requirements of this entry. The University is dedicated to provide support to those with special requirements. Further details on the support for students with disabilities or medical conditions can be found at the Access and Inclusion website.

Academic Misconduct

Edith Cowan University has firm rules governing academic misconduct and there are substantial penalties that can be applied to students who are found in breach of these rules. Academic misconduct includes, but is not limited to:

  • plagiarism;
  • unauthorised collaboration;
  • cheating in examinations;
  • theft of other students' work;

Additionally, any material submitted for assessment purposes must be work that has not been submitted previously, by any person, for any other unit at ECU or elsewhere.

The ECU rules and policies governing all academic activities, including misconduct, can be accessed through the ECU website.

CSI6218|1|2