Perform new course search

Search Filter

Computer and Network Security (8019.5)

Level: Level 3 - Undergraduate Advanced Unit
Credit Points: 3
HECS Bands: 2
Faculty: Faculty of Science and Technology
Discipline: Academic Program Area - Technology

Availability

Unit Outlines

To view your Unit Outline, click View to log in to MyUC and access this information, or visit your unit's online teaching site.

  • Semester 2, 2019, ON-CAMPUS, BRUCE (185371) - View
  • Semester 2, 2018, ON-CAMPUS, GBCA-MELB (182083) - View
  • Semester 2, 2018, ON-CAMPUS, BRUCE (182086) - View
  • Semester 2, 2017, ON-CAMPUS, SWSI-LVPL (166267) - View
  • Semester 2, 2017, ON-CAMPUS, GBCA-MELB (173278) - View
  • Semester 2, 2017, ON-CAMPUS, BRUCE (166266) - View
  • Semester 2, 2016, ON-CAMPUS, UC-MELB (151417) - View
  • Semester 2, 2016, ON-CAMPUS, SWSI-LVPL (151416) - View
  • Semester 2, 2016, ON-CAMPUS, BRUCE (151415) - View
  • Semester 2, 2015, ON-CAMPUS, UC-MELB (148014) - View
  • Semester 2, 2015, ON-CAMPUS, SWSI-LVPL (148013) - View
  • Semester 2, 2015, ON-CAMPUS, BRUCE (148012) - View

If a link to your Unit Outline is not displayed, please check back later. Unit Outlines are generally published by Week One of the relevant teaching period.

Syllabus

Recent times have seen a proliferation of digital devices and the subsequent concern for the security of information. This unit introduces students to the basic principles and practices of computer and information security. Focus will be on the software, operating system and network security techniques with detailed analysis of real-world examples. Topics include cryptography, authentication, software and operating system security, network security, mobile security, and legal and ethical issues. In addition, the unit promotes and strengthens important generic skills, such as communication, analysis and inquiry, problem solving, independent and group working, and professionalism and social responsibility.

Learning Outcomes

On successful completion of this unit, students will:

1. Describe basic cryptographic functionality, including symmetric ciphers, public key encryption, and digital signatures;

2. Evaluate the security of systems that use cryptography and secure communication techniques;

3. Identify the vulnerability of information systems and justify specific security technologies, settings, and parameters that can improve system security design;

4. Describe existing secure network architectures by applying security technologies such as firewalls, intrusion detection systems, and malicious software scanners; and

5. Discuss how privacy and social engineering issues can impact system design.

Assessment Items

Contact Hours

Up to 3 hours per week, 2L + 1T.

Prerequisites

4483 Software Technology 1

Corequisites

None.

Assumed Knowledge

IT skills commensurate with advanced study of information technology are assumed.

Incompatible Units

None.

Equivalent Units

None.



Print this page
ApplyEnquire
Why choose UC

Perform new course search

Search Filter

Frequently Asked Questions