Information Security (7162.5)
|Available teaching periods||Delivery mode||Location|
|View teaching periods|
|0.125||3||Faculty Of Science And Technology|
|Discipline||Study level||HECS Bands|
|Academic Program Area - Technology||Level 3 - Undergraduate Advanced Unit|| Band 2 2021 (Commenced After 1 Jan 2021)
Band 3 2021 (Commenced Before 1 Jan 2021)
Learning outcomesOn successful completion of this unit, students will be able to:
1. Understand organisational information security practices;
2. Analyse information security risks in personal and organisational situations and report on this analysis, as appropriate; and
3. Participate in the design of information security requirements.
Graduate attributes1. UC graduates are professional - communicate effectively
1. UC graduates are professional - display initiative and drive, and use their organisation skills to plan and manage their workload
1. UC graduates are professional - employ up-to-date and relevant knowledge and skills
1. UC graduates are professional - take pride in their professional and personal integrity
1. UC graduates are professional - use creativity, critical thinking, analysis and research skills to solve theoretical and real-world problems
2. UC graduates are global citizens - behave ethically and sustainably in their professional and personal lives
2. UC graduates are global citizens - communicate effectively in diverse cultural and social settings
2. UC graduates are global citizens - make creative use of technology in their learning and professional lives
2. UC graduates are global citizens - think globally about issues in their profession
Prerequisites6365 Systems Analysis and Modelling AND completion of 39 credit points.
|Year||Location||Teaching period||Teaching start date||Delivery mode||Unit convener|
The following books are set as recommended readings:
ISACA 2012, COBIT 5, ISACA http://www.isaca.org/cobit.htm
ISO27000 series – Information technology — Security techniques — Information security management systems
Whitman, ME & Mattord, HJ 2017, Management of information security, 5th edn, Cengage Learning
Whitman, ME & Mattord, HJ 2011, Roadmap to Information Security: For IT and InfoSec Managers, Cengage Learning
A range of academic articles relating to Information Security will also be used to support the teaching of this unit.
Submission of assessment items
Extensions & Late submissions
Students should keep a copy of all assessment items that are submitted at least until unit grades have been published at the end of semester.
Special assessment requirements
In order to pass this unit, students have to obtain a mark of 50% or greater for the assessment as a whole, and 50% or greater for the final examination. Higher grades will be awarded on the basis of the total mark being ≥ 65% for a credit, ≥ 75% for a distinction and ≥ 85% for a high distinction. Some scaling of marks and academic judgement may be applied to determine students' final grades - in this process no student will be disadvantaged.
In the case of any assignment that places you in jeopardy of a Fail in the whole unit, appropriate moderation procedures will be used.
If there is any doubt with regard to the requirements of any particular assignments or assessment procedure, the onus for clarifying the issue rests with the student who should contact the unit convener about the matter.
All work quoted from any source should be appropriately referenced using the "Harvard" referencing style as described in the link below (note that there are multiple version of the Harvard referencing style, and you should use the one described here).
Any work that has not been appropriately referenced, or has not made a reasonable attempt to follow the Harvard referencing style will be returned unmarked for resubmission. In such cases, the maximum mark that will be attainable will be 60% of the marks allocated to that assessment item.
Students have a responsibility to uphold University standards on ethical scholarship. Good scholarship involves building on the work of others and use of others' work must be acknowledged with proper attribution made. Cheating, plagiarism, and falsification of data are dishonest practices that contravene academic values. Refer to the University's Student Charter for more information.
To enhance understanding of academic integrity, all students are expected to complete the Academic Integrity Module (AIM) at least once during their course of study. You can access this module within UCLearn (Canvas) through the 'Academic Integrity and Avoiding Plagiarism' link in the Study Help site.
Use of Text-Matching Software
The University of Canberra uses text-matching software to help students and staff reduce plagiarism and improve understanding of academic integrity. The software matches submitted text in student assignments against material from various sources: the internet, published books and journals, and previously submitted student texts.
Attendance at classes:
2 hours per week, 12 weeks 24 hrs
Lecture attendance 6 hrs
Online unit lecture content 10 hrs
Preparation for tutorial work and other general reading:
3 hours per week, 9 weeks 27 hrs
Security project report 30 hrs
Security evaluation 40 hrs
Final examination – preparation/revision and sitting time 13 hrs
Total 150 hrs
Attendance at classes is not compulsory but it is advisable for students to attend as many classes as possible. Students should also be aware that the subject will be examined on material covered in classes, including lectures and tutorials and it is the individual student's responsibility to ensure that they are sufficiently familiar with this material. Attendance at classes is one of the best ways of ensuring this familiarity. Do not make the mistake of assuming that the materials provided online perfectly substitute for class attendance.
Announcements are made throughout the unit, typically to clarify requirements for assignments. Any such announcements will be made using your student email account and/or placed on the unit web site. Such announcements are deemed, within two working days, to be made to the whole group. Announcements made at an organised session are deemed to be made to the whole group.
Required IT skills
Information Security is an advanced level unit and it is generally expected that students will have a fair degree of sophistication in their knowledge of IT related matters. Students should also possess the ability to use a word processor for the production of assignments and various on-line searching tools from the Internet and the library to undertake various assignments in the unit.
Work placement, internships or practicums