Computer and Network Security (8019.5)
Available teaching periods | Delivery mode | Location |
---|---|---|
View teaching periods | ||
EFTSL | Credit points | Faculty |
0.125 | 3 | Faculty Of Science And Technology |
Discipline | Study level | HECS Bands |
Academic Program Area - Technology | Level 3 - Undergraduate Advanced Unit | Band 2 2021 (Commenced After 1 Jan 2021) Band 3 2021 (Commenced Before 1 Jan 2021) |
Learning outcomes
On successful completion of this unit, students will:1. Describe basic cryptographic functionality, including symmetric ciphers, public key encryption, and digital signatures;
2. Evaluate the security of systems that use cryptography and secure communication techniques;
3. Identify the vulnerability of information systems and justify specific security technologies, settings, and parameters that can improve system security design;
4. Describe existing secure network architectures by applying security technologies such as firewalls, intrusion detection systems, and malicious software scanners; and
5. Discuss how privacy and social engineering issues can impact system design.
Graduate attributes
1. UC graduates are professional - communicate effectively1. UC graduates are professional - display initiative and drive, and use their organisation skills to plan and manage their workload
1. UC graduates are professional - employ up-to-date and relevant knowledge and skills
1. UC graduates are professional - take pride in their professional and personal integrity
1. UC graduates are professional - use creativity, critical thinking, analysis and research skills to solve theoretical and real-world problems
2. UC graduates are global citizens - adopt an informed and balanced approach across professional and international boundaries
2. UC graduates are global citizens - behave ethically and sustainably in their professional and personal lives
2. UC graduates are global citizens - communicate effectively in diverse cultural and social settings
2. UC graduates are global citizens - make creative use of technology in their learning and professional lives
Prerequisites
4483 Software Technology 1.Corequisites
None.Incompatible units
6697 Computer and Network Security PG.Equivalent units
None.Assumed knowledge
IT skills commensurate with advanced study of information technology are assumed.Year | Location | Teaching period | Teaching start date | Delivery mode | Unit convener |
---|
Required texts
Cryptography and Network Security: Principles and Practice (7th Edition) by William Stallings
Submission of assessment items
Extensions & Late submissions
Late submission of the research paper without an approved extension will result in a penalty of 5% reduced marks from the total available, per calendar day late. Research paper submitted over 7 days late will not be accepted.
Special assessment requirements
- An aggregate mark of 50% is required to pass the unit.
- Students who do not participate in the Final Exam will receive a final grade of NC (Not Complete).
- The unit convener reserves the right to question students on any of their submitted work and may adjust awarded marks based on this questioning. See Grading Schema for the full grading schema and grade descriptors.
Academic integrity
Students have a responsibility to uphold University standards on ethical scholarship. Good scholarship involves building on the work of others and use of others' work must be acknowledged with proper attribution made. Cheating, plagiarism, and falsification of data are dishonest practices that contravene academic values. Refer to the University's Student Charter for more information.
To enhance understanding of academic integrity, all students are expected to complete the Academic Integrity Module (AIM) at least once during their course of study. You can access this module within UCLearn (Canvas) through the 'Academic Integrity and Avoiding Plagiarism' link in the Study Help site.
Use of Text-Matching Software
The University of Canberra uses text-matching software to help students and staff reduce plagiarism and improve understanding of academic integrity. The software matches submitted text in student assignments against material from various sources: the internet, published books and journals, and previously submitted student texts.
Learner engagement
Activities |
Estimated hours |
12 lectures * 2 hours each |
24 |
Lectures preparation (2*12) |
24 |
Tutorials/Labs attending (2*11) |
22 |
Tutorials/Labs preparation (2*11) |
22 |
Quizes |
23 |
Research Paper |
35 |
Total |
150 |
Participation requirements
Your participation in both class and online activities will enhance your understanding of the unit content and therefore the quality of your assessment responses. Lack of participation may result in your inability to satisfactorily pass assessment items.
Required IT skills
Basic understanding of mathematics, programming, computer hardware, operating systems, and networking.
Work placement, internships or practicums
N/A
- Semester 2, 2022, On-Campus, UC - Canberra, Bruce (207265)
- Semester 2, 2021, On-Campus, UC - Canberra, Bruce (202116)
- Semester 2, 2020, On-Campus, UC - Canberra, Bruce (195627)
- Semester 2, 2019, On-Campus, UC - Canberra, Bruce (185371)
- Semester 2, 2018, On-Campus, UC - Canberra, Bruce (182086)
- Semester 2, 2018, On-Campus, UC - Global Business College of Australia, Melbourne (182083)