Computer and Network Security (8019.5)
Available teaching periods | Delivery mode | Location |
---|---|---|
View teaching periods | ||
EFTSL | Credit points | Faculty |
0.125 | 3 | Faculty Of Science And Technology |
Discipline | Study level | HECS Bands |
Academic Program Area - Technology | Level 3 - Undergraduate Advanced Unit | Band 2 2021 (Commenced After 1 Jan 2021) Band 3 2021 (Commenced Before 1 Jan 2021) |
Learning outcomes
On successful completion of this unit, students will:1. Describe basic cryptographic functionality, including symmetric ciphers, public key encryption, and digital signatures;
2. Evaluate the security of systems that use cryptography and secure communication techniques;
3. Identify the vulnerability of information systems and justify specific security technologies, settings, and parameters that can improve system security design;
4. Describe existing secure network architectures by applying security technologies such as firewalls, intrusion detection systems, and malicious software scanners; and
5. Discuss how privacy and social engineering issues can impact system design.
Graduate attributes
1. UC graduates are professional - communicate effectively1. UC graduates are professional - display initiative and drive, and use their organisation skills to plan and manage their workload
1. UC graduates are professional - employ up-to-date and relevant knowledge and skills
1. UC graduates are professional - take pride in their professional and personal integrity
1. UC graduates are professional - use creativity, critical thinking, analysis and research skills to solve theoretical and real-world problems
2. UC graduates are global citizens - adopt an informed and balanced approach across professional and international boundaries
2. UC graduates are global citizens - behave ethically and sustainably in their professional and personal lives
2. UC graduates are global citizens - communicate effectively in diverse cultural and social settings
2. UC graduates are global citizens - make creative use of technology in their learning and professional lives
2. UC graduates are global citizens - think globally about issues in their profession
2. UC graduates are global citizens - understand issues in their profession from the perspective of other cultures
3. UC graduates are lifelong learners - adapt to complexity, ambiguity and change by being flexible and keen to engage with new ideas
3. UC graduates are lifelong learners - be self-aware
3. UC graduates are lifelong learners - evaluate and adopt new technology
3. UC graduates are lifelong learners - reflect on their own practice, updating and adapting their knowledge and skills for continual professional and academic development
Prerequisites
4483 Software Technology 1.Corequisites
None.Incompatible units
6697 Computer and Network Security PG.Equivalent units
None.Assumed knowledge
IT skills commensurate with advanced study of information technology are assumed.Year | Location | Teaching period | Teaching start date | Delivery mode | Unit convener |
---|
Required texts
Cryptography and Network Security: Principles and Practice (7th Edition) by William Stallings
Submission of assessment items
Extensions & Late submissions
Late submission of the research paper without an approved extension will result in a penalty of 5% reduced marks from the total available, per calendar day late. Research paper submitted over 7 days late will not be accepted.
Special assessment requirements
- An aggregate mark of 50% is required to pass the unit.
- Students who do not participate in the Final Exam will receive a final grade of NC (Not Complete).
- The unit convener reserves the right to question students on any of their submitted work and may adjust awarded marks based on this questioning. See Grading Schema for the full grading schema and grade descriptors.
Students must apply academic integrity in their learning and research activities at UC. This includes submitting authentic and original work for assessments and properly acknowledging any sources used.
Academic integrity involves the ethical, honest and responsible use, creation and sharing of information. It is critical to the quality of higher education. Our academic integrity values are honesty, trust, fairness, respect, responsibility and courage.
UC students have to complete the annually to learn about academic integrity and to understand the consequences of academic integrity breaches (or academic misconduct).
UC uses various strategies and systems, including detection software, to identify potential breaches of academic integrity. Suspected breaches may be investigated, and action can be taken when misconduct is found to have occurred.
Information is provided in the Academic Integrity Policy, Academic Integrity Procedure, and 69蹤獲 (Student Conduct) Rules 2023. For further advice, visit Study Skills.
Learner engagement
Activities |
Estimated hours |
12 lectures * 2 hours each |
24 |
Lectures preparation (2*12) |
24 |
Tutorials/Labs attending (2*11) |
22 |
Tutorials/Labs preparation (2*11) |
22 |
Quizes |
23 |
Research Paper |
35 |
Total |
150 |
Participation requirements
Your participation in both class and online activities will enhance your understanding of the unit content and therefore the quality of your assessment responses. Lack of participation may result in your inability to satisfactorily pass assessment items.
Required IT skills
Basic understanding of mathematics, programming, computer hardware, operating systems, and networking.
Work placement, internships or practicums
N/A
- Semester 2, 2022, On-campus, UC - Canberra, Bruce (207265)
- Semester 2, 2021, On-campus, UC - Canberra, Bruce (202116)
- Semester 2, 2020, On-campus, UC - Canberra, Bruce (195627)
- Semester 2, 2019, On-campus, UC - Canberra, Bruce (185371)
- Semester 2, 2018, On-campus, UC - Canberra, Bruce (182086)
- Semester 2, 2018, On-campus, UC - Global Business College of Australia, Melbourne (182083)