Faculty of Health, Engineering and Science

School: Computer and Security Science

This unit information may be updated and amended immediately prior to semester. To ensure you have the correct outline, please check it again at the beginning of semester.

  • Unit Title

    Threat Detection & Control Technologies
  • Unit Code

    SCY5109
  • Year

    2015
  • Enrolment Period

    1
  • Version

    1
  • Credit Points

    15
  • Full Year Unit

    N
  • Mode of Delivery

    On Campus
    Online

Description

In this unit the student explores contemporary theories and methods to control and detect intrusion into areas that range from public spaces to critical high-value facilities. Scientific principles that underpin the technologies for threat detection and control are examined. In addition, the various technologies that are used such as intruder detection systems, contraband detection systems, intelligence devices, biometric identification systems, smart cards and system functionality are critically evaluated. A highlight of the unit is the design and communication of the student's own security threat and control system for a given context, using modern electronic security technology.

Equivalent Rule

Unit was previously coded SCY4111

Learning Outcomes

On completion of this unit students should be able to:

  1. Apply a systematic problem-solving technique to security control aligned with contemporary professional practice.
  2. Critique an organisations threat detection and control needs against national and/or international standards.
  3. Design an original security threat and control system using relevant electronic security technology for a given site.
  4. Evaluate the theories, concepts and principles that underpin security threat and control in the domain of electronic security technology.

Unit Content

  1. Detection and control integration and networking, alongside related systems and sub-systems.
  2. Detection and control system design, management principles and methodology within a systems approach.
  3. Electronic threat and control systems.
  4. Foundational theories and concepts of security threat detection and control concepts used nationally and internationally.
  5. Life safety considerations and approaches.
  6. Types of detection sensors, reader credential mediums and control portals.

Additional Learning Experience Information

Lectures, tutorials, seminars and online activities hosted on Blackboard. Discussion boards are provided for both online and on-campus students to interact across delivery modes.

Assessment

GS1 GRADING SCHEMA 1 Used for standard coursework units

Students please note: The marks and grades received by students on assessments may be subject to further moderation. All marks and grades are to be considered provisional until endorsed by the relevant Board of Examiners.

ON CAMPUS
TypeDescriptionValue
EssayA review of emerging security technologies30%
Case StudyReport on a security threat and control system design based on a facility50%
Tutorial PresentationOral presentation of the Case Study Report20%
ONLINE
TypeDescriptionValue
EssayA review of emerging security technologies30%
Case StudyReport on a security threat and control system design based on a facility50%
Tutorial PresentationOral presentation of the Case Study Report20%

Text References

  • ^ Garcia, M. L. (2008). The design and evaluation of physical protection systems (2nd ed.). Boston: Butterworth-Heinemann.
  • ^ Norman T, L. (2012). Electronic access control. Boston: Butterworth-Heinemann.
  • Standards Australia. (2006). Set of AS 2201 Intrusion Alarm Systems installed in Client?s Premises. Sydney: Australian Standard Pty Ltd.
  • Smith, C. L., & Brooks, D. J. (2013). Security science: The theory and practice of security. Waltham, MA: Elsevier.

Journal References

  • IEEE. (2005 to 2013). Carnahan Conference Proceedings on Security Technology
  • The Security Journal
  • Journal of Applied Security Research

^ Mandatory reference


Disability Standards for Education (Commonwealth 2005)

For the purposes of considering a request for Reasonable Adjustments under the Disability Standards for Education (Commonwealth 2005), inherent requirements for this subject are articulated in the Unit Description, Learning Outcomes and Assessment Requirements of this entry. The University is dedicated to provide support to those with special requirements. Further details on the support for students with disabilities or medical conditions can be found at the Access and Inclusion website.

Academic Misconduct

Edith Cowan University has firm rules governing academic misconduct and there are substantial penalties that can be applied to students who are found in breach of these rules. Academic misconduct includes, but is not limited to:

  • plagiarism;
  • unauthorised collaboration;
  • cheating in examinations;
  • theft of other students' work;

Additionally, any material submitted for assessment purposes must be work that has not been submitted previously, by any person, for any other unit at ECU or elsewhere.

The ECU rules and policies governing all academic activities, including misconduct, can be accessed through the ECU website.

SCY5109|1|1

Faculty of Health, Engineering and Science

School: Computer and Security Science

This unit information may be updated and amended immediately prior to semester. To ensure you have the correct outline, please check it again at the beginning of semester.

  • Unit Title

    Threat Detection & Control Technologies
  • Unit Code

    SCY5109
  • Year

    2015
  • Enrolment Period

    2
  • Version

    1
  • Credit Points

    15
  • Full Year Unit

    N
  • Mode of Delivery

    On Campus
    Online

Description

In this unit the student explores contemporary theories and methods to control and detect intrusion into areas that range from public spaces to critical high-value facilities. Scientific principles that underpin the technologies for threat detection and control are examined. In addition, the various technologies that are used such as intruder detection systems, contraband detection systems, intelligence devices, biometric identification systems, smart cards and system functionality are critically evaluated. A highlight of the unit is the design and communication of the student's own security threat and control system for a given context, using modern electronic security technology.

Equivalent Rule

Unit was previously coded SCY4111

Learning Outcomes

On completion of this unit students should be able to:

  1. Apply a systematic problem-solving technique to security control aligned with contemporary professional practice.
  2. Critique an organisations threat detection and control needs against national and/or international standards.
  3. Design an original security threat and control system using relevant electronic security technology for a given site.
  4. Evaluate the theories, concepts and principles that underpin security threat and control in the domain of electronic security technology.

Unit Content

  1. Detection and control integration and networking, alongside related systems and sub-systems.
  2. Detection and control system design, management principles and methodology within a systems approach.
  3. Electronic threat and control systems.
  4. Foundational theories and concepts of security threat detection and control concepts used nationally and internationally.
  5. Life safety considerations and approaches.
  6. Types of detection sensors, reader credential mediums and control portals.

Additional Learning Experience Information

Lectures, tutorials, seminars and online activities hosted on Blackboard. Discussion boards are provided for both online and on-campus students to interact across delivery modes.

Assessment

GS1 GRADING SCHEMA 1 Used for standard coursework units

Students please note: The marks and grades received by students on assessments may be subject to further moderation. All marks and grades are to be considered provisional until endorsed by the relevant Board of Examiners.

ON CAMPUS
TypeDescriptionValue
EssayA review of emerging security technologies30%
Case StudyReport on a security threat and control system design based on a facility50%
Tutorial PresentationOral presentation of the Case Study Report20%
ONLINE
TypeDescriptionValue
EssayA review of emerging security technologies30%
Case StudyReport on a security threat and control system design based on a facility50%
Tutorial PresentationOral presentation of the Case Study Report20%

Text References

  • ^ Garcia, M. L. (2008). The design and evaluation of physical protection systems (2nd ed.). Boston: Butterworth-Heinemann.
  • ^ Norman T, L. (2012). Electronic access control. Boston: Butterworth-Heinemann.
  • Standards Australia. (2006). Set of AS 2201 Intrusion Alarm Systems installed in Client?s Premises. Sydney: Australian Standard Pty Ltd.
  • Smith, C. L., & Brooks, D. J. (2013). Security science: The theory and practice of security. Waltham, MA: Elsevier.

Journal References

  • IEEE. (2005 to 2013). Carnahan Conference Proceedings on Security Technology
  • The Security Journal
  • Journal of Applied Security Research

^ Mandatory reference


Disability Standards for Education (Commonwealth 2005)

For the purposes of considering a request for Reasonable Adjustments under the Disability Standards for Education (Commonwealth 2005), inherent requirements for this subject are articulated in the Unit Description, Learning Outcomes and Assessment Requirements of this entry. The University is dedicated to provide support to those with special requirements. Further details on the support for students with disabilities or medical conditions can be found at the Access and Inclusion website.

Academic Misconduct

Edith Cowan University has firm rules governing academic misconduct and there are substantial penalties that can be applied to students who are found in breach of these rules. Academic misconduct includes, but is not limited to:

  • plagiarism;
  • unauthorised collaboration;
  • cheating in examinations;
  • theft of other students' work;

Additionally, any material submitted for assessment purposes must be work that has not been submitted previously, by any person, for any other unit at ECU or elsewhere.

The ECU rules and policies governing all academic activities, including misconduct, can be accessed through the ECU website.

SCY5109|1|2