Information Security (11759.1)
|Available teaching periods||Delivery mode||Location|
|View teaching periods|| On-Campus
|| UC - Canberra, Bruce
|0.125||3||Faculty Of Science And Technology|
|Discipline||Study level||HECS Bands|
|Academic Program Area - Technology||Level 3 - Undergraduate Advanced Unit|| Band 2 2021 (Commenced After 1 Jan 2021)
Band 3 2021 (Commenced Before 1 Jan 2021)
This unit may be cotaught with 6682 Information Security PG.
Learning outcomesOn successful completion of this unit, students will be able to:
1. Interpret and integrate organisational security practices;
2. Analyse information security risks in personal and organisational situations and prepare appropriate reports for specific and non-specific audiences; and
3. Synthesise knowledge and skills to design information security requirements.
Graduate attributes1. UC graduates are professional - communicate effectively
1. UC graduates are professional - display initiative and drive, and use their organisation skills to plan and manage their workload
1. UC graduates are professional - employ up-to-date and relevant knowledge and skills
1. UC graduates are professional - take pride in their professional and personal integrity
1. UC graduates are professional - use creativity, critical thinking, analysis and research skills to solve theoretical and real-world problems
2. UC graduates are global citizens - behave ethically and sustainably in their professional and personal lives
2. UC graduates are global citizens - make creative use of technology in their learning and professional lives
PrerequisitesMust have passed 39 credit points including 11486 Systems Analysis and Modelling.
Incompatible units6682 Information Security PG
Equivalent units7162 Information Security, 11487 Information Security
|Year||Location||Teaching period||Teaching start date||Delivery mode||Unit convener|
|2023||UC - Canberra, Bruce||Semester 1||06 February 2023||On-Campus||Dr Abu Barkat Ullah|
|2024||UC - Canberra, Bruce||Semester 1||05 February 2024||On-Campus||Dr Abu Barkat Ullah|
There is no required textbook for Information Security.
The following books are set as recommended readings:
ISACA (2019), COBIT 2019, ISACA https://www.isaca.org/cobit/pages/default.aspx
ISO27000 series – Information technology — Security techniques — Information security management systems
Whitman, ME & Mattord, HJ (2019), Management of information security, 6th edn, Cengage Learning
Awad, A & Fairhurst, M. (2018), Information Security : Foundations, Technologies and Applications, Institution of Engineering & Technology
Chopra, A & Chaudhary (2019) Implementing an Information Security Management System : Security Management Based on ISO 27001 Guidelines, Apress L. P.
Vacca, J and Vacca, J (2013) Computer and Information Security Handbook, Elsevier Science & Technology
Chapple, M (2021), CISM Certified Information Security Manager Study Guide.John Wiley & Sons
A range of academic articles relating to Information Security will also be used to support the teaching of this unit.
Submission of assessment items
Extensions & Late submissions
Students should keep a copy of all assessment items that are submitted at least until unit grades have been published at the end of semester.
Special assessment requirements
In order to pass this unit, students have to obtain total marks of 50% or greater. Some scaling of marks and academic judgement may be applied to determine students' final grades - in this process no student will be disadvantaged.In the case of any assignment that places you in jeopardy of a Fail in the whole unit, appropriate moderation procedures will be used.If there is any doubt with regard to the requirements of any particular assignments or assessment procedure, the onus for clarifying the issue rests with the student, who should contact the unit convener about the matter.
All work quoted from any source should be appropriately referenced using the "Harvard (2021)" referencing style as described in the link below (note that there is multiple versions of the Harvard referencing style, and you should use the one described here).
Students who are not familiar with referencing academic work should undertake the Academic Integrity Module.
Students have a responsibility to uphold University standards on ethical scholarship. Good scholarship involves building on the work of others and use of others' work must be acknowledged with proper attribution made. Cheating, plagiarism, and falsification of data are dishonest practices that contravene academic values. Refer to the University's Student Charter for more information.
To enhance understanding of academic integrity, all students are expected to complete the Academic Integrity Module (AIM) at least once during their course of study. You can access this module within UCLearn (Canvas) through the 'Academic Integrity and Avoiding Plagiarism' link in the Study Help site.
Use of Text-Matching Software
The University of Canberra uses text-matching software to help students and staff reduce plagiarism and improve understanding of academic integrity. The software matches submitted text in student assignments against material from various sources: the internet, published books and journals, and previously submitted student texts.
|Weekly lecture: 2 hours per week, 12 weeks||24|
|Weekly Tutorial: 1 hour per week, 11 weeks||11|
|Preparation for tutorial work and other general reading: 3 hours per week, 11 weeks||33|
|Tutorial work and online discussions||22|
|Security evaluation Assessment||40|
Attendance at classes is not compulsory but it is advisable for students to attend as many classes as possible. Students should also be aware that the subject will be examined on material covered in classes, including lectures and tutorials and it is the individual student's responsibility to ensure that they are sufficiently familiar with this material. Attendance at classes is one of the best ways of ensuring this familiarity. Do not make the mistake of assuming that the materials provided online perfectly substitute for class attendance.
Announcements are made throughout the unit, typically to clarify requirements for assignments. Any such announcements will be made using your student email account and/or placed on the unit web site. Such announcements are deemed, within two working days, to be made to the whole group. Announcements made at an organised session are deemed to be made to the whole group.
Required IT skills
Information Security is an advanced level unit and it is generally expected that students will have a fair degree of sophistication in their knowledge of IT related matters. Students should also possess the ability to use a word processor for the production of assignments and various on-line searching tools from the Internet and the library to undertake various assignments in the unit.
Work placement, internships or practicums