Faculty of Health, Engineering and Science

School: Computer and Security Science

This unit information may be updated and amended immediately prior to semester. To ensure you have the correct outline, please check it again at the beginning of semester.

  • Unit Title

    Threat Detection Systems
  • Unit Code

    SCY2107
  • Year

    2015
  • Enrolment Period

    1
  • Version

    1
  • Credit Points

    15
  • Full Year Unit

    N
  • Mode of Delivery

    On Campus
    Online

Description

At the conclusion of the unit students will have an understanding of the scientific foundation used to detect threats that can exist from an array of crime facilitators. The unit identifies and explains the scientific principles, design, integration and application of threat detection using the latest technology. Current technology is examined including intruder detection, contraband detection, intelligence devices and drug detection systems. The unit results in the student modeling their own threat detection system design.

Equivalent Rule

Unit was previously coded SCY2111

Learning Outcomes

On completion of this unit students should be able to:

  1. Apply a systematic problem-solving technique to security threat detection that aligns with professional standards.
  2. Deconstruct an organisation's security threat detection needs.
  3. Describe the elements that form a threat detection system.
  4. Design a threat detection system using electronic security technology.
  5. Explain the theories, concepts and principles that underpin threat detection in the domain of electronic security technology.

Unit Content

  1. Contraband detection technologies.
  2. Determining contextual threats.
  3. Electronic counter measures.
  4. Establishing system objectives.
  5. Intrusion detection technologies.
  6. Sensor technology and methods.
  7. The science of detection.
  8. Threat detection system design and integration.

Additional Learning Experience Information

Lectures, tutorials, and syndicate activity work.

Assessment

GS1 GRADING SCHEMA 1 Used for standard coursework units

Students please note: The marks and grades received by students on assessments may be subject to further moderation. All marks and grades are to be considered provisional until endorsed by the relevant Board of Examiners.

ON CAMPUS
TypeDescriptionValue
EssayCritically evaluate the efficacy of detection sensor technologies20%
Case StudyThreat detection technologies-develop a security plan employing relevant technologies to detect contextual threats40%
Examination ^End of semester examination40%
ONLINE
TypeDescriptionValue
EssayCritically evaluate the efficacy of detection sensor technologies20%
Case StudyThreat detection technologies-develop a security plan employing relevant technologies to detect contextual threats40%
Examination ^End of semester examination40%

^ Mandatory to Pass

Text References

  • ^ Garcia, M.L. (2008). The design and evaluation of physical protection systems (2nd ed.). Boston, MA: Butterworth-Heinemann.
  • Standards Australia AS 2201.2 Intruder Alarm Systems Central Stations
  • Standards Australia AS 2201.3 Intruder Alarm Systems Detection Devices
  • Smith, C. L., & Brooks, D. J. (2013) Security science: The theory and practice of security. Waltham, MA: Elsevier.
  • Standards Australia AS 2201.5 Intruder Alarm Systems Alarm Transmission Systems
  • Carnahan Conference Proceedings Security Technology, IEEE (1987 - 2003).
  • Underwood, G. (1989). The security of buildings. London, England: Butterworths.
  • Fay, J. (2011). Contemporary security management (3rd ed.). Boston, MA: Butterworth-Heinemann.
  • Standards Australia AS 2201.1 Intrusion Alarm Systems installed in Client?s Premises
  • Standards Australia AS 2201.4 Intruder Alarm Systems Wire Free Systems

^ Mandatory reference


Disability Standards for Education (Commonwealth 2005)

For the purposes of considering a request for Reasonable Adjustments under the Disability Standards for Education (Commonwealth 2005), inherent requirements for this subject are articulated in the Unit Description, Learning Outcomes and Assessment Requirements of this entry. The University is dedicated to provide support to those with special requirements. Further details on the support for students with disabilities or medical conditions can be found at the Access and Inclusion website.

Academic Misconduct

Edith Cowan University has firm rules governing academic misconduct and there are substantial penalties that can be applied to students who are found in breach of these rules. Academic misconduct includes, but is not limited to:

  • plagiarism;
  • unauthorised collaboration;
  • cheating in examinations;
  • theft of other students' work;

Additionally, any material submitted for assessment purposes must be work that has not been submitted previously, by any person, for any other unit at ECU or elsewhere.

The ECU rules and policies governing all academic activities, including misconduct, can be accessed through the ECU website.

SCY2107|1|1

Faculty of Health, Engineering and Science

School: Computer and Security Science

This unit information may be updated and amended immediately prior to semester. To ensure you have the correct outline, please check it again at the beginning of semester.

  • Unit Title

    Threat Detection Systems
  • Unit Code

    SCY2107
  • Year

    2015
  • Enrolment Period

    2
  • Version

    1
  • Credit Points

    15
  • Full Year Unit

    N
  • Mode of Delivery

    On Campus
    Online

Description

At the conclusion of the unit students will have an understanding of the scientific foundation used to detect threats that can exist from an array of crime facilitators. The unit identifies and explains the scientific principles, design, integration and application of threat detection using the latest technology. Current technology is examined including intruder detection, contraband detection, intelligence devices and drug detection systems. The unit results in the student modeling their own threat detection system design.

Equivalent Rule

Unit was previously coded SCY2111

Learning Outcomes

On completion of this unit students should be able to:

  1. Apply a systematic problem-solving technique to security threat detection that aligns with professional standards.
  2. Deconstruct an organisation's security threat detection needs.
  3. Describe the elements that form a threat detection system.
  4. Design a threat detection system using electronic security technology.
  5. Explain the theories, concepts and principles that underpin threat detection in the domain of electronic security technology.

Unit Content

  1. Contraband detection technologies.
  2. Determining contextual threats.
  3. Electronic counter measures.
  4. Establishing system objectives.
  5. Intrusion detection technologies.
  6. Sensor technology and methods.
  7. The science of detection.
  8. Threat detection system design and integration.

Additional Learning Experience Information

Lectures, tutorials, and syndicate activity work.

Assessment

GS1 GRADING SCHEMA 1 Used for standard coursework units

Students please note: The marks and grades received by students on assessments may be subject to further moderation. All marks and grades are to be considered provisional until endorsed by the relevant Board of Examiners.

ON CAMPUS
TypeDescriptionValue
EssayCritically evaluate the efficacy of detection sensor technologies20%
Case StudyThreat detection technologies-develop a security plan employing relevant technologies to detect contextual threats40%
Examination ^End of semester examination40%
ONLINE
TypeDescriptionValue
EssayCritically evaluate the efficacy of detection sensor technologies20%
Case StudyThreat detection technologies-develop a security plan employing relevant technologies to detect contextual threats40%
Examination ^End of semester examination40%

^ Mandatory to Pass

Text References

  • ^ Garcia, M.L. (2008). The design and evaluation of physical protection systems (2nd ed.). Boston, MA: Butterworth-Heinemann.
  • Carnahan Conference Proceedings Security Technology, IEEE (1987 - 2003).
  • Underwood, G. (1989). The security of buildings. London, England: Butterworths.
  • Fay, J. (2011). Contemporary security management (3rd ed.). Boston, MA: Butterworth-Heinemann.
  • Standards Australia AS 2201.4 Intruder Alarm Systems Wire Free Systems
  • Standards Australia AS 2201.1 Intrusion Alarm Systems installed in Client?s Premises
  • Standards Australia AS 2201.2 Intruder Alarm Systems Central Stations
  • Standards Australia AS 2201.3 Intruder Alarm Systems Detection Devices
  • Standards Australia AS 2201.5 Intruder Alarm Systems Alarm Transmission Systems
  • Smith, C. L., & Brooks, D. J. (2013) Security science: The theory and practice of security. Waltham, MA: Elsevier.

^ Mandatory reference


Disability Standards for Education (Commonwealth 2005)

For the purposes of considering a request for Reasonable Adjustments under the Disability Standards for Education (Commonwealth 2005), inherent requirements for this subject are articulated in the Unit Description, Learning Outcomes and Assessment Requirements of this entry. The University is dedicated to provide support to those with special requirements. Further details on the support for students with disabilities or medical conditions can be found at the Access and Inclusion website.

Academic Misconduct

Edith Cowan University has firm rules governing academic misconduct and there are substantial penalties that can be applied to students who are found in breach of these rules. Academic misconduct includes, but is not limited to:

  • plagiarism;
  • unauthorised collaboration;
  • cheating in examinations;
  • theft of other students' work;

Additionally, any material submitted for assessment purposes must be work that has not been submitted previously, by any person, for any other unit at ECU or elsewhere.

The ECU rules and policies governing all academic activities, including misconduct, can be accessed through the ECU website.

SCY2107|1|2