Information Security (11487.1)
|Available teaching periods||Delivery mode||Location|
|View teaching periods|
|0.125||3||Faculty Of Science And Technology|
|Discipline||Study level||HECS Bands|
|Academic Program Area - Technology||Level 2 - Undergraduate Intermediate Unit|| Band 2 2021 (Commenced After 1 Jan 2021)
Band 3 2021 (Commenced Before 1 Jan 2021)
This unit may be cotaught with 6682 Information Security PG.
Learning outcomesOn successful completion of this unit, students will be able to:
1. Understand organisational information security practices;
2. Analyse information security risks in personal and organisational situations and report on this analysis, as appropriate; and
3. Participate in the design of information security requirements.
Graduate attributes1. UC graduates are professional - communicate effectively
1. UC graduates are professional - display initiative and drive, and use their organisation skills to plan and manage their workload
1. UC graduates are professional - employ up-to-date and relevant knowledge and skills
1. UC graduates are professional - take pride in their professional and personal integrity
1. UC graduates are professional - use creativity, critical thinking, analysis and research skills to solve theoretical and real-world problems
2. UC graduates are global citizens - behave ethically and sustainably in their professional and personal lives
2. UC graduates are global citizens - make creative use of technology in their learning and professional lives
Prerequisites11486 Systems Analysis and Modelling
Incompatible units6682 Information Security PG
Equivalent units7162 Information Security
|Year||Location||Teaching period||Teaching start date||Delivery mode||Unit convener|
There is no required textbook for Information Security.
The following books are set as recommended readings:
ISACA 2019, COBIT 2019, ISACA https://www.isaca.org/cobit/pages/default.aspx
ISO27000 series – Information technology — Security techniques — Information security management systems
Whitman, ME & Mattord, HJ 2019, Management of information security, 6th edn, Cengage Learning
Whitman, ME & Mattord, HJ 2011, Roadmap to Information Security: For IT and InfoSec Managers, Cengage Learning
A range of academic articles relating to Information Security will also be used to support the teaching of this unit.
Submission of assessment items
Extensions & Late submissions
Students should keep a copy of all assessment items that are submitted at least until unit grades have been published at the end of semester.
Special assessment requirements
In order to pass this unit, students have to obtain a mark of 50% or greater for the assessment as a whole, and 50% or greater for the take home assignment. Higher grades will be awarded on the basis of the total mark being ≥ 65% for a credit, ≥ 75% for a distinction and ≥ 85% for a high distinction. Some scaling of marks and academic judgement may be applied to determine students' final grades - in this process no student will be disadvantaged.
In the case of any assignment that places you in jeopardy of a Fail in the whole unit, appropriate moderation procedures will be used.
If there is any doubt with regard to the requirements of any particular assignments or assessment procedure, the onus for clarifying the issue rests with the student who should contact the unit convener about the matter.
All work quoted from any source should be appropriately referenced using the "Harvard" referencing style as described in the link below (note that there are multiple version of the Harvard referencing style, and you should use the one described here).
Students who are not familiar with referencing academic work should undertake the Academic Integrity Module.
Students have a responsibility to uphold University standards on ethical scholarship. Good scholarship involves building on the work of others and use of others' work must be acknowledged with proper attribution made. Cheating, plagiarism, and falsification of data are dishonest practices that contravene academic values. Refer to the University's Student Charter for more information.
To enhance understanding of academic integrity, all students are expected to complete the Academic Integrity Module (AIM) at least once during their course of study. You can access this module within UCLearn (Canvas) through the 'Academic Integrity and Avoiding Plagiarism' link in the Study Help site.
Use of Text-Matching Software
The University of Canberra uses text-matching software to help students and staff reduce plagiarism and improve understanding of academic integrity. The software matches submitted text in student assignments against material from various sources: the internet, published books and journals, and previously submitted student texts.
Attendance at classes:
Tutorials - 1 hour per week, 11 weeks 11 hrs
Lecture attendance - 2 hours per week, 12 weeks 24 hrs
Preparation for tutorial work and other general reading:
3 hours per week, 11 weeks 33 hrs
Security project report 30 hrs
Security evaluation 40 hrs
Take home assignment – preparation/revision and sitting time 12 hrs
Total 150 hrs
Attendance at classes is not compulsory but it is advisable for students to attend as many classes as possible. Students should also be aware that the subject will be examined on material covered in classes, including lectures and tutorials and it is the individual student's responsibility to ensure that they are sufficiently familiar with this material. Attendance at classes is one of the best ways of ensuring this familiarity. Do not make the mistake of assuming that the materials provided online perfectly substitute for class attendance.
Announcements are made throughout the unit, typically to clarify requirements for assignments. Any such announcements will be made using your student email account and/or placed on the unit web site. Such announcements are deemed, within two working days, to be made to the whole group. Announcements made at an organised session are deemed to be made to the whole group.
Required IT skills
Information Security is an advanced level unit and it is generally expected that students will have a fair degree of sophistication in their knowledge of IT related matters. Students should also possess the ability to use a word processor for the production of assignments and various on-line searching tools from the Internet and the library to undertake various assignments in the unit.
Work placement, internships or practicums